<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ryan+W+Smith</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ryan+W+Smith"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ryan_W_Smith"/>
		<updated>2026-04-22T01:55:19Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=118235</id>
		<title>Authentication Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Authentication_Cheat_Sheet&amp;diff=118235"/>
				<updated>2011-09-29T20:48:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction  =&lt;br /&gt;
&lt;br /&gt;
'''Authentication''' is the process of verification that an individual or an entity is who it claims to be. Authentication is commonly performed by submitting a user name or ID and one or more items of private information that only a given user should know. &lt;br /&gt;
&lt;br /&gt;
'''Session Management''' is a process by which a server maintains the state of an entity interacting with it. This is required for a server to remember how to react to subsequent requests throughout a transaction. Sessions are maintained on the server by a session identifier which can be passed back and forward between the client and server when transmitting and receiving requests. Sessions should be unique per user and computationally very difficult to predict. &lt;br /&gt;
&lt;br /&gt;
For more information on Authentication, please see the OWASP [[Guide to Authentication]] page.&lt;br /&gt;
&lt;br /&gt;
= Authentication General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
== Implement Proper Password Strength Controls  ==&lt;br /&gt;
&lt;br /&gt;
A key concern when using passwords for authentication is password strength. A &amp;quot;strong&amp;quot; password policy makes it difficult or even improbable for one to guess the password either by using manual or automated means. The following characteristics define strong a strong password: &lt;br /&gt;
&lt;br /&gt;
=== Password Length  ===&lt;br /&gt;
&lt;br /&gt;
Longer passwords provide a greater combination of characters and consequently make it more difficult for an attacker to guess. &lt;br /&gt;
&lt;br /&gt;
'''Important applications''': Minimum of 6 characters in length. &lt;br /&gt;
&lt;br /&gt;
'''Critical applications''': Minimum of 8 characters in length. (consider multi-factor authentication) &lt;br /&gt;
&lt;br /&gt;
'''Highly critical applications''': Consider multi-factor authentication &lt;br /&gt;
&lt;br /&gt;
=== Password complexity  ===&lt;br /&gt;
&lt;br /&gt;
'''Example'''&amp;lt;br&amp;gt;Passwords should be checked for the following composition or a variance of such: &lt;br /&gt;
&lt;br /&gt;
*at least: 1 uppercase character (A-Z) &lt;br /&gt;
*at least: 1 lowercase character (a-z) &lt;br /&gt;
*at least: 1 digit (0-9) &lt;br /&gt;
*at least: 1 special character (!&amp;quot;£$%&amp;amp;amp;...) &lt;br /&gt;
*a defined minimum length (e.g. 8 chars) &lt;br /&gt;
*a defined maximum length (as with all external input) &lt;br /&gt;
*no contiguous characters (e.g. 123abcd) &lt;br /&gt;
*not more than 2 identical characters in a row (1111)&lt;br /&gt;
&lt;br /&gt;
== Implement Secure Password Recovery Mechanism  ==&lt;br /&gt;
&lt;br /&gt;
It is common for an application to have a mechanism that provides a means for a user to gain access to their account in the event they forget their password. Please see [https://www.owasp.org/index.php/Forgot_Password_Cheat_Sheet https://www.owasp.org/index.php/Forgot_Password_Cheat_Sheet] for details on this feature.&lt;br /&gt;
&lt;br /&gt;
== Require Current Password for Password Changes == &lt;br /&gt;
&lt;br /&gt;
In order to mitigate account hijacking, it's important to require the current password for an account before updating sensitive account information such as the user's password.  Without this countermeasure an attacker may be able to change the user's password through a CSRF or XSS attack, without needing to know the user's current password.  Additionally an attacker may get temporary physical access to a user's browser or by using a session riding attack.  Email address changes should similarly be authenticated, since many password recovery systems send password or password reset instructions to the user's email address.&lt;br /&gt;
&lt;br /&gt;
== Utilize Multi-Factor Authentication  ==&lt;br /&gt;
&lt;br /&gt;
Multifactor factor authentication is using more than one of: &lt;br /&gt;
&lt;br /&gt;
*Something you know (account details or passwords) &lt;br /&gt;
*Something you have (tokens or mobile phones) &lt;br /&gt;
*Something you are (biometrics)&lt;br /&gt;
&lt;br /&gt;
to logon or process a transaction. &lt;br /&gt;
&lt;br /&gt;
Authentication schemes such as One Time Passwords (OTP) implemented using a hardware token can also be&amp;amp;nbsp;key&amp;amp;nbsp;in fighting attacks such as CSRF and client-side malware. &lt;br /&gt;
&lt;br /&gt;
== Authentication and Error Messages  ==&lt;br /&gt;
&lt;br /&gt;
Incorrectly implemented error messages in the case of authentication functionality can be used for the purposes of user ID and password enumeration. &lt;br /&gt;
&lt;br /&gt;
'''An application should respond (both HTTP and HTML)&amp;amp;nbsp;in a generic manner which is not unique to the error condition or authentication failure.''' &lt;br /&gt;
&lt;br /&gt;
==== Authentication responses  ====&lt;br /&gt;
&lt;br /&gt;
An application should respond with a generic error message regardless if the user ID or password was incorrect. It should also give no indication to the status of an existing account.&lt;br /&gt;
&lt;br /&gt;
==== Incorrect responses examples  ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login for User foo: invalid password&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed, invalid user ID&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; account disabled&amp;quot; &lt;br /&gt;
*&amp;quot;Login failed; this user is not active&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Correct response example  ====&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Login failed; Invalid user&amp;amp;nbsp;ID or password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The correct response does not indicate if the user ID or password is the incorrect parameter and hence inferring a valid user ID. &lt;br /&gt;
&lt;br /&gt;
==== Error Codes and URL's  ====&lt;br /&gt;
&lt;br /&gt;
The application may return a different HTTP Error code depending on the authentication attempt response. It&amp;amp;nbsp;may respond with a 200 for a positive result and a 403 for a negative result. Even though a generic error page is shown to a user, the HTTP response code may differ which can indicate a signature.&lt;br /&gt;
&lt;br /&gt;
== Transmit Passwords Only Over TLS  ==&lt;br /&gt;
&lt;br /&gt;
See: &amp;quot;Transport Layer Protection Cheat Sheet&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet http://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet] &lt;br /&gt;
&lt;br /&gt;
&amp;quot;The login page and all subsequent authenticated pages must be exclusively accessed over TLS. The initial login page, referred to as the &amp;quot;login landing page&amp;quot;, must be served over TLS. Failure to utilize TLS for the login landing page allows an attacker to modify the login form action, causing the user's credentials to be posted to an arbitrary location. Failure to utilize TLS for authenticated pages after the login enables an attacker to view the unencrypted session ID and compromise the user's authenticated session.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
== Implement Account Lockout  ==&lt;br /&gt;
&lt;br /&gt;
If an attacker is able to guess passwords without the account becoming disabled due to failed authentication attempts, the attacker has an opportunity to continue with a brute force attack until the account is compromised. &lt;br /&gt;
&lt;br /&gt;
Automating brute-force/password guessing attacks on web applications is a trivial challenge. Password lockout mechanisms should be employed that lock out an account if more than a preset number of unsuccessful login attempts are made. &lt;br /&gt;
&lt;br /&gt;
Password lockout mechanisms have a logical weakness. An attacker that undertakes a large numbers of authentication attempts on known account names can produce a result that locks out entire blocks of application users accounts. &lt;br /&gt;
&lt;br /&gt;
Given that the intent of a password lockout system is to protect from brute-force attacks, a sensible strategy is to lockout accounts for a number of hours. This significantly slows down attackers, while allowing the accounts to be open for legitimate users. &lt;br /&gt;
&lt;br /&gt;
See also &amp;quot;Reverse Brute-force&amp;quot; [[Reverse Brute Force|Reverse_Brute_Force]]&lt;br /&gt;
&lt;br /&gt;
= Session Management General Guidelines  =&lt;br /&gt;
&lt;br /&gt;
Session management is directly related to authentication. The '''Session Management General Guidelines''' previously available on this OWASP Authentication Cheat Sheet have been integrated into the new [https://www.owasp.org/index.php/Session_Management_Cheat_Sheet OWASP Session Management Cheat Sheet]. &lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}} &lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Eoin Keary eoinkeary[at]owasp.org &lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110897</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110897"/>
				<updated>2011-05-21T00:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Buttoncreate2.png‎|link=http://owaspdallasjune.eventbrite.com/]] &lt;br /&gt;
&lt;br /&gt;
'''Title:''' “Phyber SecurityTM”: Security for Cyber Physical Systems&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Dr. Suku Nair,Chair and Professor, Department of Computer Science and Engineering, SMU&lt;br /&gt;
&lt;br /&gt;
'''Date:''' June 1, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
Richland College &lt;br /&gt;
12800 Abrams RD&lt;br /&gt;
Dallas TX 75243&lt;br /&gt;
&lt;br /&gt;
'''Room''': SH118 &lt;br /&gt;
&lt;br /&gt;
'''Building:''' Sabine Hall (there's a coffee shop and a book store on the first floor, which make a good reference when asking for directions)&lt;br /&gt;
&lt;br /&gt;
'''Directions: ''' For campus directions please visit &lt;br /&gt;
http://www.richlandcollege.edu/directions/&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' There's plenty of free parking in the lot directly in front of the building where we're meeting.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' http://www.richlandcollege.edu/map/ &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free, but please register at [http://owaspdallasjune.eventbrite.com/ http://owaspdallasjune.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Cyber Physical Systems (CPS) is the new embedded systems with a tight link between computational and physical elements. Phyber Security deals with secure deployment and maintenance of CPS. Some of the challenges include resource constraints, physically unprotected deployment scenarios, and key management. Recent advancements in semi-conductor technologies, in particular, Physical Unclonable Functions (PUFs), offer viable channels for secure coupling between cyber and physical substrates. In this talk, we will present scalable protocols based on PUFs technology for securing CPS to provide system integrity, confidentiality, and authenticity. As an example, we will discuss the application of the technology for RFID security.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
Suku Nair received his B.S. in Electronics and Communication Engineering from the University of Kerala. He received his M.S. and Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana in 1988 and 1990, respectively. Currently, he is a Professor and Chair of the department of Computer Science and Engineering SMU at Dallas where he held a J. Lindsay Embrey Trustee Professorship in Engineering. His research interests include Network Security, Fault-Tolerant Computing.&lt;br /&gt;
&lt;br /&gt;
[[Image:Buttoncreate2.png‎|link=http://owaspdallasjune.eventbrite.com/]] &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==May 4, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:MobileTopTen.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  The Forum (on the first floor)&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MobileTopTen.pdf&amp;diff=110896</id>
		<title>File:MobileTopTen.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MobileTopTen.pdf&amp;diff=110896"/>
				<updated>2011-05-21T00:29:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110895</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110895"/>
				<updated>2011-05-21T00:28:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Buttoncreate2.png‎|link=http://owaspdallasjune.eventbrite.com/]] &lt;br /&gt;
&lt;br /&gt;
'''Title:''' “Phyber SecurityTM”: Security for Cyber Physical Systems&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Dr. Suku Nair,Chair and Professor, Department of Computer Science and Engineering, SMU&lt;br /&gt;
&lt;br /&gt;
'''Date:''' June 1, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
Richland College &lt;br /&gt;
12800 Abrams RD&lt;br /&gt;
Dallas TX 75243&lt;br /&gt;
&lt;br /&gt;
'''Room''': SH118 &lt;br /&gt;
&lt;br /&gt;
'''Building:''' Sabine Hall (there's a coffee shop and a book store on the first floor, which make a good reference when asking for directions)&lt;br /&gt;
&lt;br /&gt;
'''Directions: ''' For campus directions please visit &lt;br /&gt;
http://www.richlandcollege.edu/directions/&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' There's plenty of free parking in the lot directly in front of the building where we're meeting.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' http://www.richlandcollege.edu/map/ &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free, but please register at [http://owaspdallasjune.eventbrite.com/ http://owaspdallasjune.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Cyber Physical Systems (CPS) is the new embedded systems with a tight link between computational and physical elements. Phyber Security deals with secure deployment and maintenance of CPS. Some of the challenges include resource constraints, physically unprotected deployment scenarios, and key management. Recent advancements in semi-conductor technologies, in particular, Physical Unclonable Functions (PUFs), offer viable channels for secure coupling between cyber and physical substrates. In this talk, we will present scalable protocols based on PUFs technology for securing CPS to provide system integrity, confidentiality, and authenticity. As an example, we will discuss the application of the technology for RFID security.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
Suku Nair received his B.S. in Electronics and Communication Engineering from the University of Kerala. He received his M.S. and Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana in 1988 and 1990, respectively. Currently, he is a Professor and Chair of the department of Computer Science and Engineering SMU at Dallas where he held a J. Lindsay Embrey Trustee Professorship in Engineering. His research interests include Network Security, Fault-Tolerant Computing.&lt;br /&gt;
&lt;br /&gt;
[[Image:Buttoncreate2.png‎|link=http://owaspdallasjune.eventbrite.com/]] &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==May 4, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  The Forum (on the first floor)&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110894</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110894"/>
				<updated>2011-05-21T00:24:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: Undo revision 110886 by Ryan W Smith (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==May 4, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  The Forum (on the first floor)&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110893</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110893"/>
				<updated>2011-05-21T00:22:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: Undo revision 110887 by Ryan W Smith (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' &lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;nowiki&amp;gt;&amp;lt;div style=&amp;quot;width:100%; text-align:left;&amp;quot; &amp;gt;&amp;lt;iframe  src=&amp;quot;http://owaspdallasjune.eventbrite.com?ref=eweb&amp;quot; frameborder=&amp;quot;0&amp;quot; height=&amp;quot;1000&amp;quot; width=&amp;quot;100%&amp;quot; vspace=&amp;quot;0&amp;quot; hspace=&amp;quot;0&amp;quot; marginheight=&amp;quot;5&amp;quot; marginwidth=&amp;quot;5&amp;quot; scrolling=&amp;quot;auto&amp;quot; allowtransparency=&amp;quot;true&amp;quot;&amp;gt;&amp;lt;/iframe&amp;gt;&amp;lt;div style=&amp;quot;font-family:Helvetica, Arial; font-size:10px; padding:5px 0 5px; margin:2px; width:100%; text-align:left;&amp;quot; &amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://www.eventbrite.com/features?ref=eweb&amp;quot; &amp;gt;Online Ticketing&amp;lt;/a&amp;gt;&amp;lt;span style=&amp;quot;color:#ddd;&amp;quot; &amp;gt; for &amp;lt;/span&amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://owaspdallasjune.eventbrite.com?ref=eweb&amp;quot; &amp;gt;OWASP Dallas Monthly Meeting :: Dr. Suku Nair - “Phyber Security”: Security for Cyber Physical Systems&amp;lt;/a&amp;gt;&amp;lt;span style=&amp;quot;color:#ddd;&amp;quot; &amp;gt; powered by &amp;lt;/span&amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://www.eventbrite.com?ref=eweb&amp;quot; &amp;gt;Eventbrite&amp;lt;/a&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/nowiki&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
*We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' The Forum (on the first floor) &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming. &lt;br /&gt;
&lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. &lt;br /&gt;
&lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' &lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png|FortifyHP.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting. &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Meeting Details:  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security &lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' Atrium A&amp;amp;amp;B &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal. &lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and Incident &amp;amp;amp; Audit Response, Prevention, and Recovery. &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
***UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit. We'll raffle this at the end of the meeting for all who've registered*. * must be present to win &lt;br /&gt;
*We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11) &lt;br /&gt;
*We have added an official EventBright RSVP page. '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11) &lt;br /&gt;
*We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Veracode logo 2color OWASP.jpg|Veracode logo 2color OWASP.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it. &lt;br /&gt;
&lt;br /&gt;
=== Meeting Details:  ===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''. &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave) &lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Buttoncreate2.png&amp;diff=110892</id>
		<title>File:Buttoncreate2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Buttoncreate2.png&amp;diff=110892"/>
				<updated>2011-05-21T00:16:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: EventBrite Registration Button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;EventBrite Registration Button&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110887</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110887"/>
				<updated>2011-05-21T00:07:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' &lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;br&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
*We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' The Forum (on the first floor) &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming. &lt;br /&gt;
&lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. &lt;br /&gt;
&lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' &lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png|FortifyHP.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting. &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Meeting Details:  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security &lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' Atrium A&amp;amp;amp;B &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal. &lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and Incident &amp;amp;amp; Audit Response, Prevention, and Recovery. &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
***UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit. We'll raffle this at the end of the meeting for all who've registered*. * must be present to win &lt;br /&gt;
*We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11) &lt;br /&gt;
*We have added an official EventBright RSVP page. '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11) &lt;br /&gt;
*We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Veracode logo 2color OWASP.jpg|Veracode logo 2color OWASP.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it. &lt;br /&gt;
&lt;br /&gt;
=== Meeting Details:  ===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''. &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave) &lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110886</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110886"/>
				<updated>2011-05-21T00:06:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' &lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;nowiki&amp;gt;&amp;lt;div style=&amp;quot;width:100%; text-align:left;&amp;quot; &amp;gt;&amp;lt;iframe  src=&amp;quot;http://owaspdallasjune.eventbrite.com?ref=eweb&amp;quot; frameborder=&amp;quot;0&amp;quot; height=&amp;quot;1000&amp;quot; width=&amp;quot;100%&amp;quot; vspace=&amp;quot;0&amp;quot; hspace=&amp;quot;0&amp;quot; marginheight=&amp;quot;5&amp;quot; marginwidth=&amp;quot;5&amp;quot; scrolling=&amp;quot;auto&amp;quot; allowtransparency=&amp;quot;true&amp;quot;&amp;gt;&amp;lt;/iframe&amp;gt;&amp;lt;div style=&amp;quot;font-family:Helvetica, Arial; font-size:10px; padding:5px 0 5px; margin:2px; width:100%; text-align:left;&amp;quot; &amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://www.eventbrite.com/features?ref=eweb&amp;quot; &amp;gt;Online Ticketing&amp;lt;/a&amp;gt;&amp;lt;span style=&amp;quot;color:#ddd;&amp;quot; &amp;gt; for &amp;lt;/span&amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://owaspdallasjune.eventbrite.com?ref=eweb&amp;quot; &amp;gt;OWASP Dallas Monthly Meeting :: Dr. Suku Nair - “Phyber Security”: Security for Cyber Physical Systems&amp;lt;/a&amp;gt;&amp;lt;span style=&amp;quot;color:#ddd;&amp;quot; &amp;gt; powered by &amp;lt;/span&amp;gt;&amp;lt;a style=&amp;quot;color:#ddd; text-decoration:none;&amp;quot; target=&amp;quot;_blank&amp;quot; href=&amp;quot;http://www.eventbrite.com?ref=eweb&amp;quot; &amp;gt;Eventbrite&amp;lt;/a&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/nowiki&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
*We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE &lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' The Forum (on the first floor) &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming. &lt;br /&gt;
&lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. &lt;br /&gt;
&lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' &lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png|FortifyHP.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting. &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Meeting Details:  ==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security &lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt; '''Building:''' Hughes-Trigg Student Center '''Room:''' Atrium A&amp;amp;amp;B &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal. &lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and Incident &amp;amp;amp; Audit Response, Prevention, and Recovery. &lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== **RECENT&amp;amp;nbsp;UPDATES**  ===&lt;br /&gt;
&lt;br /&gt;
***UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit. We'll raffle this at the end of the meeting for all who've registered*. * must be present to win &lt;br /&gt;
*We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11) &lt;br /&gt;
*We have added an official EventBright RSVP page. '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11) &lt;br /&gt;
*We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors:  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Veracode logo 2color OWASP.jpg|Veracode logo 2color OWASP.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen shot 2011-02-24 at 10.47.51 AM.png|Screen shot 2011-02-24 at 10.47.51 AM.png]] &lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it. &lt;br /&gt;
&lt;br /&gt;
=== Meeting Details:  ===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''. &lt;br /&gt;
&lt;br /&gt;
'''Directions:''' For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp] &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''. &lt;br /&gt;
&lt;br /&gt;
'''Campus Map:''' An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/] Printable map: &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave) &lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110885</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=110885"/>
				<updated>2011-05-21T00:00:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasjune.eventbrite.com/ Click here to RSVP for the June 1, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on June 1, 2011  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==May 4, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  The Forum (on the first floor)&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=109377</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=109377"/>
				<updated>2011-04-21T18:18:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on May 4th, 2011 with Clint Pollock of Veracode presenting:&amp;lt;br&amp;gt; &amp;quot;Using the Mobile Top 10 as a Guide for Mobile Application Security&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the May 4th, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  The Forum (on the first floor)&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=109312</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=109312"/>
				<updated>2011-04-20T21:53:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on May 4th, 2011 with Clint Pollock of Veracode presenting:&amp;lt;br&amp;gt; &amp;quot;Using the Mobile Top 10 as a Guide for Mobile Application Security&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the May 4th, 2011 Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on May 4, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We're still looking for a sponsor for the May 4th meeting, if your company is interested in sponsoring this or future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] - 4/20/2011&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Title''': Using the Mobile Top 10 as a Guide for Mobile Application Security &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Clint Pollock, VERACODE&lt;br /&gt;
&lt;br /&gt;
'''Date''': May 4, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  TBD - It will be on the first floor, but stay tuned for more details&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for May 4th, 2011 (FREE)]''' or Email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The Top 10 Mobile Application Risks, or “Mobile App Top 10” for short, is a list of the most prevalent risks to look for in the mobile applications you are developing and consuming.&lt;br /&gt;
 &lt;br /&gt;
Many of the risks in mobile devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.&lt;br /&gt;
 &lt;br /&gt;
The Mobile App Top 10 can be used to determine the coverage of a security solution which can protect against these risks. A mobile app security solution can declare its coverage of the Mobile App Top 10 so customers can understand what risks the solution mitigates. Mobile app security solutions can be used in the development of an app, as part of an app store vetting process, for acceptance testing of an app, or for security software running on a mobile device.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=108019</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=108019"/>
				<updated>2011-03-31T17:54:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Perfetti of Impact Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  Fortify will be sponsoring the lunch for this meeting, if your company is interested in sponsoring future meetings, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
&lt;br /&gt;
[[Image:FortifyHP.png‎|link=http://www.fortify.com]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank Fortify for sponsoring the lunch for this meeting.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thank SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:FortifyHP.png&amp;diff=108018</id>
		<title>File:FortifyHP.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:FortifyHP.png&amp;diff=108018"/>
				<updated>2011-03-31T17:51:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107868</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107868"/>
				<updated>2011-03-29T17:25:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Perfetti of Impact Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Building:'''  Hughes-Trigg Student Center&lt;br /&gt;
'''Room:'''  Atrium A&amp;amp;B&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107103</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107103"/>
				<updated>2011-03-17T18:43:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Perfetti of Impact Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107092</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=107092"/>
				<updated>2011-03-17T15:46:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Perfetti of Imapct Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106483</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106483"/>
				<updated>2011-03-08T21:57:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Profetti of Imapct Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Breaking the Paradigm of AppSec as a Disruptive Cost Center&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106468</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106468"/>
				<updated>2011-03-08T17:52:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Profetti of Imapct Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for the April 6th Chapter Meeting (FREE)]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Checklist for Application Security, Systems, Internetworking, and Engineering&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://owaspdallasmtg.eventbrite.com/ Click here to RSVP for April 6th (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106461</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106461"/>
				<updated>2011-03-08T17:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Profetti of Imapct Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Checklist for Application Security, Systems, Internetworking, and Engineering&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': [[Media:OWASP-Dallas-Chapter-Mar-2011-1.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Dallas-Chapter-Mar-2011-1.pdf&amp;diff=106459</id>
		<title>File:OWASP-Dallas-Chapter-Mar-2011-1.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Dallas-Chapter-Mar-2011-1.pdf&amp;diff=106459"/>
				<updated>2011-03-08T17:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: Matt Tesauro, Web Testing YOUR Way
Dallas OWASP - March 2011&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Matt Tesauro, Web Testing YOUR Way&lt;br /&gt;
Dallas OWASP - March 2011&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106458</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=106458"/>
				<updated>2011-03-08T17:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:Ryan.Smith@OWASP.org Ryan W Smith], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and Leah Teutsch (currently on leave).|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Announcements  ====&lt;br /&gt;
&lt;br /&gt;
'''The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''we're keeping it going on April 6th, 2011 with Peter Profetti of Imapct Security presenting:&amp;lt;br&amp;gt; &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Next Meeting on April 6, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** -  We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] &lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks SMU for agreeing to host us until May, 2011&lt;br /&gt;
&lt;br /&gt;
* '''We're currently looking for a sponsor for the lunch, if your company is interested in sponsoring, please email [mailto:Ryan.Smith@OWASP.org Ryan.Smith@OWASP.org] '''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Meeting Details:==&lt;br /&gt;
&lt;br /&gt;
'''Title''': Checklist for Application Security, Systems, Internetworking, and Engineering&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Peter Perfetti, Impact Security&lt;br /&gt;
&lt;br /&gt;
'''Date''': April 6, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': &amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
'''Room details are TBD - Stay Tuned For Updates'''&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]''' or Email [mailto:RyanWSmith@gmail.com Ryan.Smith@OWASP.org]&lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
This presentation outlines the primary risk concerns for application security, audit, and compliance then expands on those topics to create a &amp;quot;Checklist for Application Security, Systems, Internetworking, and Engineering&amp;quot;. The presentation begins with understanding the types of risks involved, the current pitfalls (and in some cases pratfalls) companies struggle to endure, and what we can do to fix them. The presenter outlines the basic foundation on how to build a program for success, debunking the myth that you can’t have operational stability, security, and compliance while reducing operating costs, and how using this approach helps to achieve this goal.&lt;br /&gt;
&lt;br /&gt;
Applications are currently a major attack vector as well as being difficult to keep stable, secure, and compliant. But securing only the applications, or just the infrastructure can lead to compromise; and audit, compliance, and legal problems. By applying the author's philosophy and  checklists to your organization, staff from support, engineering, application development, up to CISOs can more effectively work together to improve security and meet Executive Management’s tolerance for business risk while achieving business objectives. This presentation highlights the issues, demonstrates how the entire enterprise works together, and finally outlines a basic checklist and a methodology for CISOs, Developers, Administrators, and Engineers alike to ensure business and technology risk management work in concert with all technology areas, including audit and compliance.The method draws its strengths from proven frameworks such as OWASP, SAMM, Visible Ops, FFIEC, CoBIT, and ITIL.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Vulnerability &amp;amp; Risk Assessment; developing, enhancing, and implementing Security and Risk Management programs; and  Incident &amp;amp; Audit Response, Prevention, and Recovery.&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==March 2, 2011==&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Slides''': &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
== March 2, 2011  ==&lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.Smith@OWASP.org Ryan W Smith]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
Leah Teutsch (currently on leave)&lt;br /&gt;
&lt;br /&gt;
 __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPDallasMarch2Directions.pdf&amp;diff=106029</id>
		<title>File:OWASPDallasMarch2Directions.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPDallasMarch2Directions.pdf&amp;diff=106029"/>
				<updated>2011-03-01T17:54:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105859</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105859"/>
				<updated>2011-02-25T19:43:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&lt;br /&gt;
=== Sponsors: ===&lt;br /&gt;
[[Image:Veracode_logo_2color_OWASP.jpg|link=http://veracode.com]]    &lt;br /&gt;
&lt;br /&gt;
[[Image:Screen_shot_2011-02-24_at_10.47.51_AM.png|link=http://www.smu.edu]]&lt;br /&gt;
&lt;br /&gt;
We would like to thanks Veracode for providing a light deli lunch for this meeting, and of course SMU for hosting it.  &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Screen_shot_2011-02-24_at_10.47.51_AM.png&amp;diff=105857</id>
		<title>File:Screen shot 2011-02-24 at 10.47.51 AM.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Screen_shot_2011-02-24_at_10.47.51_AM.png&amp;diff=105857"/>
				<updated>2011-02-25T19:32:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105599</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105599"/>
				<updated>2011-02-23T05:22:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* **UPDATE** - Matt Tesauro will be bringing a professionally bound copy of the OWASP 2010 Top 10, signed by the authors Jeff Williams (http://www.owasp.org/index.php/User:Jeff_Williams) and Dave Wichers (http://www.owasp.org/index.php/User:Wichers) that he picked up at the Summit.  We'll raffle this at the end of the meeting for all who've registered*. * must be present to win&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105532</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=105532"/>
				<updated>2011-02-21T19:39:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://bit.ly/fWT3pN]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MCampusEastMapNameBLKOL.pdf&amp;diff=104762</id>
		<title>File:MCampusEastMapNameBLKOL.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MCampusEastMapNameBLKOL.pdf&amp;diff=104762"/>
				<updated>2011-02-09T21:44:07Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: SMU Campus Map&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SMU Campus Map&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104761</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104761"/>
				<updated>2011-02-09T21:42:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
===**RECENT&amp;amp;nbsp;UPDATES**===&lt;br /&gt;
&lt;br /&gt;
* We have posted the room and building information below, as well as information about parking and maps of the SMU Campus (2/9/11)&lt;br /&gt;
* We have added an official EventBright RSVP page.  '''[http://www.eventbrite.com/event/1287249197 Please Click here to RSVP for March 2nd (FREE)]''' (2/8/11)&lt;br /&gt;
* We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. (2/7/11)&lt;br /&gt;
&lt;br /&gt;
'''Make sure to sign up for any of the social media network links above to get future announcements.'''&lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104760</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104760"/>
				<updated>2011-02-09T21:26:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT&amp;amp;nbsp;UPDATE**'''&amp;amp;nbsp;- We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
We are still waiting for details on the building and room assignment, and will announce those details soon. &amp;amp;nbsp;Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT UPDATE**''' - We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;lt;br&amp;gt;We are still waiting for details on the building and room assignment, and will announce those details soon. Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
===Meeting Details:===&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&lt;br /&gt;
&lt;br /&gt;
We will meet at: '''Huitt Zollars room''' located at the '''Embrey building''' at '''SMU Main Campus (Dallas)'''.&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
For campus direction please visit [http://smu.edu/maps/directions.asp http://smu.edu/maps/directions.asp]&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' &lt;br /&gt;
For parking, guests have few options, they can use '''Moody Parking Garage for $5''', the machine takes cash or plastic. Otherwise, they can look for free parking spots on '''University Boulevard''' or '''Mcfarlin Boulevard'''.&lt;br /&gt;
&lt;br /&gt;
'''Campus Map:'''&lt;br /&gt;
An interactive campus map can be found at [http://smu.edu/maps/flash/ http://smu.edu/maps/flash/]&lt;br /&gt;
Printable map:  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104558</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104558"/>
				<updated>2011-02-09T02:56:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT&amp;amp;nbsp;UPDATE**'''&amp;amp;nbsp;- We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
We are still waiting for details on the building and room assignment, and will announce those details soon. &amp;amp;nbsp;Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar: &lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Building, room, and parking details are still TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon) &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT UPDATE**''' - We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;lt;br&amp;gt;We are still waiting for details on the building and room assignment, and will announce those details soon. Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar: &lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''':&amp;amp;nbsp;'''**Recently Updated**''' &lt;br /&gt;
&lt;br /&gt;
Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
Building, room, and parking details are still TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon) &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' Email [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] or '''[http://www.eventbrite.com/event/1287249197 Click here to RSVP for March 2nd (FREE)]'''   &lt;br /&gt;
This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104539</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=104539"/>
				<updated>2011-02-08T22:37:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}} &lt;br /&gt;
&lt;br /&gt;
== Get Connected and Stay Connected  ==&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization. &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group]. We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership. &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:''' &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|Join the list.png]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|Follow-us-on-twitter.png]] &lt;br /&gt;
| [[Image:Join-us-on-Facebook.jpg|175px|Join-us-on-Facebook.jpg]] &lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|Linkedin-button.gif]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT&amp;amp;nbsp;UPDATE**'''&amp;amp;nbsp;- We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
We are still waiting for details on the building and room assignment, and will announce those details soon. &amp;amp;nbsp;Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar: &lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''': '''**Recently Updated**'''&amp;lt;br&amp;gt;Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Building, room, and parking details are still TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon) &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:RyanWSmith@Gmail.com RyanWSmith@gmail.com] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD''' &lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd  ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011. &lt;br /&gt;
&lt;br /&gt;
'''**RECENT UPDATE**''' - We have confirmed that Southern Methodist University will host our upcoming meeting on March 2nd. &amp;lt;br&amp;gt;We are still waiting for details on the building and room assignment, and will announce those details soon. Make sure to sign up for any of the social media network links above to get future announcements. &lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar: &lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way. &lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian] &lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011 &lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Location''':&amp;amp;nbsp;'''**Recently Updated**''' &lt;br /&gt;
&lt;br /&gt;
Southern Methodist University &amp;lt;br&amp;gt;6425 Boaz Lane&amp;lt;br&amp;gt;Dallas TX 75205 &lt;br /&gt;
&lt;br /&gt;
Building, room, and parking details are still TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon) &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:RyanWSmith@gmail.com RyanWSmith@gmail.com] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you. After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way. After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time. OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you: Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud. The choice is yours with WTE. &lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds. The overall project goal is to make testing tools as widely available and easily usable as possible. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''': &lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications. &lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil. &lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. &lt;br /&gt;
&lt;br /&gt;
Linkedin Profile: http://www.linkedin.com/in/matttesauro &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman &lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid. Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
From Dallas: Take 183-West to 114-West (Toward Grapevine) Exit on Solana/Kirkwood Blvd Turn Left onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
From Fort Worth: Take I-35W North Take exit 70 toward Dallas/Bridgeport/Tx-114 Turn Right onto 114 East Exit on Solana Blvd Turn Right onto Kirkwood Blvd Turn Right onto Campus Circle (You will see the CoreLogic sign) &lt;br /&gt;
&lt;br /&gt;
Link to Directions (Please Note: CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical Applications from Time Bombs, BAckdoors &amp;amp;amp; More &lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover; • Prevalence of backdoors and malicious code in third party attacks • Definitions and classifications of backdoors and their impact on your applications • Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Clint Pollock, Senior Solutions Architect, Veracode &lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M. I will send a permit to those who have RSVP'd by Monday, June 29. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes. http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!! Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP. Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win) &lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event! We look forward to seeing you there! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy, Dallas, TX 75220, (214) 358-4159 &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In &lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080 &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C. I will send a permit to those who have RSVP'd by Tuesday, March 2nd. Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers. Finding Workflow-based Defects. &lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software &lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport) &lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass. Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] This will help expedite the check-in process. Thanks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''======================================================''' &lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Vulnerability Management in an Application Security World. Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal, Denim Group Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas OWASP Flyer.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:''' &lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch] &lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln] &lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian] &lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith] __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103411</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103411"/>
				<updated>2011-02-05T07:37:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, due to the atypical weather we've had this week, we haven't been able to confirm the venue.  Not to worry though, we have an excellent speaker confirmed, and plenty of backup venues, so make sure to sign up for any of the social media network links above to get future announcements.&lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar:&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian]&lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location''': TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon)&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:Ryan.W.Smith@Praetorian.com Ryan.W.Smith@Praetorian.com]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you.  After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way.  After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time.  OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you:  Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud.  The choice is yours with WTE.&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds.  The overall project goal is to make testing tools as widely available and easily usable as possible.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''':&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting.  Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
Linkedin Profile:  http://www.linkedin.com/in/matttesauro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD'''&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, due to the atypical weather we've had this week, we haven't been able to confirm the venue.  Not to worry though, we have an excellent speaker confirmed, and plenty of backup venues, so make sure to sign up for any of the social media network links above to get future announcements.&lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar:&lt;br /&gt;
&lt;br /&gt;
'''Title''': OWASP WTE: Application Pen Testing '''your''' way.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian]&lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location''': TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon)&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:Ryan.W.Smith@Praetorian.com Ryan.W.Smith@Praetorian.com]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you.  After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way.  After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time.  OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you:  Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud.  The choice is yours with WTE.&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds.  The overall project goal is to make testing tools as widely available and easily usable as possible.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''':&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting.  Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
Linkedin Profile:  http://www.linkedin.com/in/matttesauro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive ====&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:'''&lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln]&lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian]&lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103410</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103410"/>
				<updated>2011-02-05T04:41:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, due to the atypical weather we've had this week, we haven't been able to confirm the venue.  Not to worry though, we have an excellent speaker confirmed, and plenty of backup venues, so make sure to sign up for any of the social media network links above to get future announcements.&lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar:&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian]&lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location''': TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon)&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''':&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting.  Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
Linkedin Profile:  http://www.linkedin.com/in/matttesauro&lt;br /&gt;
&lt;br /&gt;
'''Title''': &lt;br /&gt;
&lt;br /&gt;
OWASP WTE: Application Pen Testing '''your''' way.&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you.  After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way.  After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time.  OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you:  Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud.  The choice is yours with WTE.&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds.  The overall project goal is to make testing tools as widely available and easily usable as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mark your calendars, Dallas OWASP is now meeting on the first wednesday of every month from 11:30AM to 1:00PM at venues TBD'''&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, due to the atypical weather we've had this week, we haven't been able to confirm the venue.  Not to worry though, we have an excellent speaker confirmed, and plenty of backup venues, so make sure to sign up for any of the social media network links above to get future announcements.&lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian]&lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location''': TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon)&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''':&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting.  Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
Linkedin Profile:  http://www.linkedin.com/in/matttesauro&lt;br /&gt;
&lt;br /&gt;
'''Title''': &lt;br /&gt;
&lt;br /&gt;
OWASP WTE: Application Pen Testing '''your''' way.&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you.  After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way.  After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time.  OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you:  Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud.  The choice is yours with WTE.&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds.  The overall project goal is to make testing tools as widely available and easily usable as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive ====&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:'''&lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln]&lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian]&lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103409</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103409"/>
				<updated>2011-02-05T04:37:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting on March 2nd ==&lt;br /&gt;
&lt;br /&gt;
The rumors are true, Dallas OWASP is back in full swing with monthly meetings on the first Wednesday of every month starting with OWASP's own Matt Tesauro on March 2nd, 2011.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, due to the atypical weather we've had this week, we haven't been able to confirm the venue.  Not to worry though, we have an excellent speaker confirmed, and plenty of backup venues, so make sure to sign up for any of the social media network links above to get future announcements.&lt;br /&gt;
&lt;br /&gt;
Here are the details thusfar:&lt;br /&gt;
&lt;br /&gt;
'''Speaker''': Matt Tesauro, [http://bit.ly/fQGqIk OWASP] Board Member, Project Lead for the [http://bit.ly/hIbx9c OWASP WTE Live CD project], and VP of Services at [http://bit.ly/fNj64E Praetorian]&lt;br /&gt;
&lt;br /&gt;
'''Date''': March 2, 2011&lt;br /&gt;
&lt;br /&gt;
'''Time''': 11:30AM - 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Location''': TBD - Check back or sign up on [http://bit.ly/eHEW6O Twitter] a [http://on.fb.me/fHr5XY Facebook] and/or [http://linkd.in/g3WxGG Linkedin] for updates (coming very soon)&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio''':&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the [http://bit.ly/fQGqIk OWASP Foundation] and highly involved in many OWASP projects and committees. Matt is the project leader of the [http://bit.ly/hIbx9c OWASP WTE] (Web Testing Environment) which is the source of theOWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Matt is currently serving as the VP of services at [http://bit.ly/fNj64E Praetorian], leveraging his experience in application security and consulting.  Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
Linkedin Profile:  http://www.linkedin.com/in/matttesauro&lt;br /&gt;
&lt;br /&gt;
'''Title''': &lt;br /&gt;
&lt;br /&gt;
OWASP WTE: Application Pen Testing '''your''' way.&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': &lt;br /&gt;
&lt;br /&gt;
One of the pain points of application penetration testing is keeping all your tools up to date and installed on whatever computer you happen to have with you.  After several successful releases of the OWASP Live CD, I had a bit of a think and decided that there was a better way.  After a bunch of re-tooling (the fancy word is refactoring), OWASP WTE is ready for prime time.  OWASP Web Testing Environment is a project to package application testing tools and make them available in a variety of ways - you pick what works for you:  Live CD, Virtual Machine, ala carte installations on your existing Ubuntu system, or maybe even attack tools in the cloud.  The choice is yours with WTE.&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover where OWASP WTE is currently, what features are available and what the future holds.  The overall project goal is to make testing tools as widely available and easily usable as possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings ====&lt;br /&gt;
&lt;br /&gt;
We are currently working on securing a venue, but we plan to start monthly meetings in March 2011.  &lt;br /&gt;
&lt;br /&gt;
Stay tuned for details, which should be announced by the end of this week (2/4/2011).&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive ====&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:'''&lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln]&lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian]&lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103012</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=103012"/>
				<updated>2011-02-02T04:57:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Dallas OWASP Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pardon our Silence, while we regroup:'''&lt;br /&gt;
&lt;br /&gt;
Some of the more regular Dallas OWASP members may have noticed a lull in activity in the Dallas OWASP Chapter lately, and we apologize for that.&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter leadership has gone through some restructuring, new leaders have come on board to help out, and we believe we are back on track and ready to start 2011 out right.&lt;br /&gt;
&lt;br /&gt;
We are currently working on securing a venue, but we plan to start monthly meetings again in March 2011.  &lt;br /&gt;
&lt;br /&gt;
Stay tuned for details, which should be announced by the end of this week (2/4/2011).&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings ====&lt;br /&gt;
&lt;br /&gt;
We are currently working on securing a venue, but we plan to start monthly meetings in March 2011.  &lt;br /&gt;
&lt;br /&gt;
Stay tuned for details, which should be announced by the end of this week (2/4/2011).&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive ====&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:'''&lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln]&lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian]&lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102979</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102979"/>
				<updated>2011-02-01T23:10:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pardon our Silence:'''&lt;br /&gt;
&lt;br /&gt;
Some of the more regular Dallas OWASP members may have noticed a lull in activity in the Dallas OWASP Chapter lately, and we apologize for that.&lt;br /&gt;
&lt;br /&gt;
The Dallas OWASP chapter leadership has gone through some restructuring, new leaders have come on board to help out, and we believe we are back on track and ready to start 2011 out right.&lt;br /&gt;
&lt;br /&gt;
We are currently working on securing a venue, but we plan to start monthly meetings again in March 2011.  &lt;br /&gt;
&lt;br /&gt;
Stay tuned for details, which should be announced by the end of this week (2/4/2011).&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings ====&lt;br /&gt;
&lt;br /&gt;
We are currently working on securing a venue, but we plan to start monthly meetings in March 2011.  &lt;br /&gt;
&lt;br /&gt;
Stay tuned for details, which should be announced by the end of this week (2/4/2011).&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
This is a new program, we will start collecting our speakers' presentation materials and make them available for viewing and download here.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings Archive ====&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
'''The Dallas OWASP chapter leaders are:'''&lt;br /&gt;
&lt;br /&gt;
[mailto:teutsch@utdallas.edu Leah Teutsch]&lt;br /&gt;
&lt;br /&gt;
[mailto:andrea.wendeln@gmail.com Andrea Wendeln]&lt;br /&gt;
&lt;br /&gt;
[mailto:Don.McMillian@acs-inc.com Don McMillian]&lt;br /&gt;
&lt;br /&gt;
[mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102978</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102978"/>
				<updated>2011-02-01T22:49:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102977</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102977"/>
				<updated>2011-02-01T22:47:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://bit.ly/fWT3pN Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Join the list.png|150px|link=http://bit.ly/fWT3pN]] || [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]]   || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] || [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Join_the_list.png&amp;diff=102976</id>
		<title>File:Join the list.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Join_the_list.png&amp;diff=102976"/>
				<updated>2011-02-01T22:38:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: join the mailing list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;join the mailing list&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102975</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102975"/>
				<updated>2011-02-01T22:38:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  &lt;br /&gt;
&lt;br /&gt;
In addition to our [http://lists.owasp.org/pipermail/owasp-dallas Mailing List] we also have a [http://bit.ly/eHEW6O Dallas OWASP Twitter Feed] a [http://on.fb.me/fHr5XY Dallas OWASP Facebook Page] and a [http://linkd.in/g3WxGG Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
'''Click any of the links below to visit the corresponding Dallas OWASP social networking groups:'''&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
| [[File:Follow-us-on-twitter.png|175px|link=http://bit.ly/eHEW6O]] ||  [[File:Linkedin-button.gif|135px|link=http://linkd.in/g3WxGG]]  || [[File:Join-us-on-Facebook.jpg|175px|link=http://on.fb.me/fHr5XY]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Join-us-on-Facebook.jpg&amp;diff=102974</id>
		<title>File:Join-us-on-Facebook.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Join-us-on-Facebook.jpg&amp;diff=102974"/>
				<updated>2011-02-01T22:10:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: join us on facebook button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;join us on facebook button&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Linkedin-button.gif&amp;diff=102973</id>
		<title>File:Linkedin-button.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Linkedin-button.gif&amp;diff=102973"/>
				<updated>2011-02-01T22:09:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: join us on linkedin button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;join us on linkedin button&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Follow-us-on-twitter.png&amp;diff=102972</id>
		<title>File:Follow-us-on-twitter.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Follow-us-on-twitter.png&amp;diff=102972"/>
				<updated>2011-02-01T22:08:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: twitter follow button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;twitter follow button&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102971</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=102971"/>
				<updated>2011-02-01T22:07:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan W Smith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln], [mailto:Don.McMillian@acs-inc.com Don McMillian] and [mailto:Ryan.W.Smith@Praetorian.com Ryan W Smith].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
== Get Connected and Stay Connected ==&lt;br /&gt;
The Dallas OWASP chapter is proud to announce several new ways to keep in touch with the leadership and other members of the chapter and greater organization.  In addition to our [http://lists.owasp.org/pipermail/owasp-dallas Mailing List] we also have a [http://twitter.com/owaspdallas Dallas OWASP Twitter Feed] a [http://www.facebook.com/pages/Owasp-Dallas-Chapter/125587757511332 Dallas OWASP Facebook Page] and a [http://www.linkedin.com/groups?mostPopular=&amp;amp;gid=3768104 Linkedin Group].  We invite you to join or follow whichever groups suit you, get involved with your fellow Dallas OWASP Chapter members, and we'll keep them all up to date with the latest official news and announcements from the chapter leadership.  &lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ryan W Smith</name></author>	</entry>

	</feed>