<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tracy</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tracy"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Tracy"/>
		<updated>2026-04-10T00:35:00Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=148759</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=148759"/>
				<updated>2013-03-28T19:16:27Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;04/25/2013&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
* Time: 6:30pm - 9:30 pm&lt;br /&gt;
* Location: '''TIBCO Offices''' 200 Garden City Plaza, Suite 220, Garden City, NY 11530 &lt;br /&gt;
* Directions:  [https://maps.google.com/maps?hl=en&amp;amp;q=200++Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ie=UTF-8&amp;amp;hq=&amp;amp;hnear=0x89c27d7c971cb6db:0x3b25e3102c9f3ded,200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;gl=us&amp;amp;daddr=200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ei=yIRUUcqLI5HE4AP2sYGACg&amp;amp;ved=0CC4QwwUwAA Map]&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_april2013.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Abstract:&lt;br /&gt;
While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. RailsGoat is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Abstract:&lt;br /&gt;
Like it or not, your developers copy and paste code and &amp;quot;borrow&amp;quot; ideas from open source projects. This presentation will detail the results of analyzing over 100,000 Android applications available publicly on GitHub. We will examine the most prevalent frameworks and libraries in use and discuss their implications for security. Our focus is less theoretical and more practical based on what developers are actually doing and using within their apps. From there, we will take a deeper look at common vulnerabilities that are systemic throughout the Android application ecosystem. We will look at specific examples of vulnerable real-world applications, and fix code on the fly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''' - &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=148756</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=148756"/>
				<updated>2013-03-28T18:00:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;04/25/2013&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:30 pm&lt;br /&gt;
* Location: '''TIBCO Offices''' 200  Garden City Plaza, Garden City, NY 11530 &lt;br /&gt;
* Directions:  [https://maps.google.com/maps?hl=en&amp;amp;q=200++Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ie=UTF-8&amp;amp;hq=&amp;amp;hnear=0x89c27d7c971cb6db:0x3b25e3102c9f3ded,200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;gl=us&amp;amp;daddr=200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ei=yIRUUcqLI5HE4AP2sYGACg&amp;amp;ved=0CC4QwwUwAA Map]&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_april2013.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Abstract:&lt;br /&gt;
While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. RailsGoat is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Abstract:&lt;br /&gt;
Like it or not, your developers copy and paste code and &amp;quot;borrow&amp;quot; ideas from open source projects. This presentation will detail the results of analyzing over 100,000 Android applications available publicly on GitHub. We will examine the most prevalent frameworks and libraries in use and discuss their implications for security. Our focus is less theoretical and more practical based on what developers are actually doing and using within their apps. From there, we will take a deeper look at common vulnerabilities that are systemic throughout the Android application ecosystem. We will look at specific examples of vulnerable real-world applications, and fix code on the fly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''' - &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135995</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135995"/>
				<updated>2012-09-17T19:00:46Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135994</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135994"/>
				<updated>2012-09-17T19:00:21Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135993</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135993"/>
				<updated>2012-09-17T18:59:49Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: room change&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135860</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135860"/>
				<updated>2012-09-14T14:40:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135859</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135859"/>
				<updated>2012-09-14T14:40:17Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/25/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135628</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=135628"/>
				<updated>2012-09-10T21:22:46Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 13 meeting has been postponed to September 25''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Due to unforeseen circumstances the September meeting has been rescheduled to Tuesday September 25th.  Please register by using the link below or modify your registration accordingly....&lt;br /&gt;
We apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/25/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=134218</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=134218"/>
				<updated>2012-08-12T19:54:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=134217</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=134217"/>
				<updated>2012-08-12T19:45:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=132258</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=132258"/>
				<updated>2012-06-27T15:21:50Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Sept2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=131574</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=131574"/>
				<updated>2012-06-18T16:44:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: Update registration Details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Sept2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=131572</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=131572"/>
				<updated>2012-06-18T16:33:00Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: Update details for Sept Meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 7:00pm - 9:00 pm&lt;br /&gt;
*Location: Adelphi University, IT conference room in the lower level of Hagedorn Hall of Enterprise.&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''May Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/Register/Checkin.aspx?EventID=1089917 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''February Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122605</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122605"/>
				<updated>2012-01-10T16:41:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: update URL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122603</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122603"/>
				<updated>2012-01-10T16:36:02Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122602</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122602"/>
				<updated>2012-01-10T16:35:21Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122600</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122600"/>
				<updated>2012-01-10T16:34:24Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122597</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122597"/>
				<updated>2012-01-10T15:47:18Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm at Adelphi University. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122596</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=122596"/>
				<updated>2012-01-10T15:33:26Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm at Adelphi University. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120666</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120666"/>
				<updated>2011-11-23T15:32:22Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm at Adelphi University. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120564</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120564"/>
				<updated>2011-11-21T20:30:07Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm at Adelphi University. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120563</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120563"/>
				<updated>2011-11-21T20:14:29Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; January 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120562</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=120562"/>
				<updated>2011-11-21T20:13:00Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank you to all those who attended the November 17th meeting.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Summary:''&lt;br /&gt;
&lt;br /&gt;
The OWASP Long Island chapter's last meeting was held Thursday, November 17th from 7pm-10pm. It was the first joint event between IEEE and OWASP participants.  Dr. Kees Leune, an infosec expert and instructor organized and led a hands-on lab using a virtual network.  Participants experienced first hand the most critical risks of web applications.  We decided to continue this fun and learning experience in the next meeting sometime in January. Stay tuned!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119730</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119730"/>
				<updated>2011-11-01T14:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Chapter meeting has been scheduled for November,  See details Below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
This is a Joint meeting between OWASP and IEEE&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Additional parking parking will be at Nassau Blvd. train station,  Campus is about a 5-10 minute walk from there.  Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119547</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119547"/>
				<updated>2011-10-25T18:36:58Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Chapter meeting has been scheduled for November,  See details Below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
This is a Joint meeting between OWASP and IEEE&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119546</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119546"/>
				<updated>2011-10-25T18:35:53Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Chapter meeting has been scheduled for November,  See details Below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
This is a Joint meeting between OWASP and IEEE&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119545</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119545"/>
				<updated>2011-10-25T18:35:31Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Chapter meeting has been scheduled for November,  See details Below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
This is a Joint meeting between OWASP and IEEE&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119544</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=119544"/>
				<updated>2011-10-25T18:35:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Chapter meeting has been scheduled for November,  See details Below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
This is a Joint meeting between OWASP and IEEE&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Nov2011 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=118021</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=118021"/>
				<updated>2011-09-26T15:33:05Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP Calendar [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** BOULDER: Every third Thursday of the month except Nov and Dec ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** SINGAPORE: Every first Thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== 2011 ===&lt;br /&gt;
&lt;br /&gt;
'''November 17 (18:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''September 22 (18:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 14 (12:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 24 (19:00h) - [http://www.owasp.org/index.php/Ireland-Limerick Ireland-Limerick Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 3 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
=== 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Feb 10 (17:15h) - [http://www.owasp.org/index.php/Perth_Australia#Threat_Modelling_in_the_Software_Development_Lifecycle_.28Feb_2009.29 Perth Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''April 1 Boston OWASP Chapter meeting - Breaking Browsers - [http://www.owasp.org/index.php/boston Boston Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''September 15 (11:30 to 1:30 pm) Dallas OWASP Chapter meeting - Detective Work for Testers Finding Workflow-based Defects - [http://www.owasp.org/index.php/Dallas Dallas Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (17:30h) -  [http://www.owasp.org/index.php/Netherlands#Announcement_December_11th_2008:_Architectural_and_design_risk_analysis Netherlands Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (17:30h) - [https://www.owasp.org/index.php/Denmark#Local_News Denmark Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 22nd-25th - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NY/NJ Metro]'''&lt;br /&gt;
&lt;br /&gt;
'''Aug 21 (18:00h) - [http://www.owasp.org/index.php/Boulder#Next_Meeting Boulder Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (18:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 26 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:15h) - [[Helsinki|Helsinki chapter and RWSUG seminar]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:30h) - [[Cincinnati|Cincinnati chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 20 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 15 (11:00h) - [[Pune|Pune chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 12 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 6 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 5 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (13:00h) - [[Israel|OWASP Israel 2007]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Seattle|Seattle Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Sacramento|Sacramento Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (09:30h) - [[Turkey|Turkey Chapter Meeting - Izmir]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 24 (13:30h) - [[Turkey|Turkey Chapter Meeting - Ankara]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 20 (18:00h) - [[Belgium|Belgium Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Houston|Houston Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 11 (18:00h) - [[Ireland|Ireland Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (19:00h) - [[Singapore|Singapore OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 3 (18:30h) - [[Malaysia|Malaysia OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Oct 9 (19:30h) - [[Singapore|Singapore OWASP chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Oct 2 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (1800h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (13:00h) - [[Taiwan|Taiwan chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 10 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 7 (15:00h) [[Germany|German chapter meeting]]''' - Restart of the German Chapter&lt;br /&gt;
&lt;br /&gt;
'''Sept (12:00h) - [[Belgium|Belgium OWASP Day Event]] '''&lt;br /&gt;
&lt;br /&gt;
'''Sept 6 (18:00h) - [[Kansas_City|Kansas City Chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[Chicago|Chicago Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (17:00h) - [[Israel|Israeli chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 25 (18:00h) - [[San Jose|San Jose Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 24 (17:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 (11:00h) - [[Turkey|Turkey chapter meeting - 1st Web Security Days]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 6 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30h) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 22 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 21 (19:00h) - [[Denver]]''' - Anti-DNS Pinning Attacks / Calculating Return on Security Investment (ROSI)&lt;br /&gt;
&lt;br /&gt;
'''June 19 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (08:00h) - [[Vietnam|Vietnam chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 - [[Melbourne | Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 - [[Boston]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 - [[Turkey]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 - [[Virginia (Northern Virginia)|Washington DC (VA)]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 - [[Toronto]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 - [[Belgium]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 - [[Rochester]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 - [[Israel]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 - [[New Zealand]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 - [[Italy]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Houston]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Melbourne]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Helsinki]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 - [[New Jersey]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 - [[Spain]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 - [[Turkey]]'''&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118016</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118016"/>
				<updated>2011-09-26T15:04:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank You to all those who attended last weeks chapter meeting, and helped make it a success.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The next meeting is being planned for November.  More details will be posted soon. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: TBD&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118011</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118011"/>
				<updated>2011-09-26T15:03:47Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank You to all those who attended last weeks chapter meeting, and helped make it a success.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The next meeting has been planned for November.  More details will be posted soon. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: TBD&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118006</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118006"/>
				<updated>2011-09-26T15:03:23Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank You to all those who attended last weeks chapter meeting, and helped make it a success.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The next meeting has been planned for November.  More details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: TBD&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118003</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=118003"/>
				<updated>2011-09-26T15:02:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Thank You to all those who attended last weeks chapter meeting, and helped make it a success.  The next meeting has been planned for November.  More details will be posted soon.''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: Adelphi University&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: TBD&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, November 17 &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=117391</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=117391"/>
				<updated>2011-09-15T14:44:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Our Long Island Chapter meeting is now scheduled for:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 22&lt;br /&gt;
* Location: Student Center room # 127, Hofstra University, Hempstead, NY&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: &lt;br /&gt;
&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): &amp;lt;!--To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. --&amp;gt; From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, September 22 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Hofstra University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116667</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116667"/>
				<updated>2011-09-04T18:18:02Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Our Long Island Chapter meeting is now scheduled for:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 22&lt;br /&gt;
* Location: Hofstra University, Hempstead, NY&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: &lt;br /&gt;
&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): &amp;lt;!--To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. --&amp;gt; From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, September 22 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Hofstra University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116666</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116666"/>
				<updated>2011-09-04T18:17:27Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Our Long Island Chapter meeting is now scheduled for:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 22&lt;br /&gt;
* Location: Hofstra University, Hempstead, NY&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: &lt;br /&gt;
&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): &amp;lt;!--To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. --&amp;gt; From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, September 22 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Hofstra University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=116611</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=116611"/>
				<updated>2011-09-01T21:50:11Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP Calendar [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** BOULDER: Every third Thursday of the month except Nov and Dec ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** SINGAPORE: Every first Thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== 2011 ===&lt;br /&gt;
&lt;br /&gt;
'''September 22 (18:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 14 (12:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 24 (19:00h) - [http://www.owasp.org/index.php/Ireland-Limerick Ireland-Limerick Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 3 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
=== 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Feb 10 (17:15h) - [http://www.owasp.org/index.php/Perth_Australia#Threat_Modelling_in_the_Software_Development_Lifecycle_.28Feb_2009.29 Perth Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''April 1 Boston OWASP Chapter meeting - Breaking Browsers - [http://www.owasp.org/index.php/boston Boston Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''September 15 (11:30 to 1:30 pm) Dallas OWASP Chapter meeting - Detective Work for Testers Finding Workflow-based Defects - [http://www.owasp.org/index.php/Dallas Dallas Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (17:30h) -  [http://www.owasp.org/index.php/Netherlands#Announcement_December_11th_2008:_Architectural_and_design_risk_analysis Netherlands Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (17:30h) - [https://www.owasp.org/index.php/Denmark#Local_News Denmark Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 22nd-25th - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NY/NJ Metro]'''&lt;br /&gt;
&lt;br /&gt;
'''Aug 21 (18:00h) - [http://www.owasp.org/index.php/Boulder#Next_Meeting Boulder Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (18:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 26 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:15h) - [[Helsinki|Helsinki chapter and RWSUG seminar]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:30h) - [[Cincinnati|Cincinnati chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 20 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 15 (11:00h) - [[Pune|Pune chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 12 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 6 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 5 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (13:00h) - [[Israel|OWASP Israel 2007]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Seattle|Seattle Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Sacramento|Sacramento Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (09:30h) - [[Turkey|Turkey Chapter Meeting - Izmir]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 24 (13:30h) - [[Turkey|Turkey Chapter Meeting - Ankara]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 20 (18:00h) - [[Belgium|Belgium Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Houston|Houston Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 11 (18:00h) - [[Ireland|Ireland Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (19:00h) - [[Singapore|Singapore OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 3 (18:30h) - [[Malaysia|Malaysia OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Oct 9 (19:30h) - [[Singapore|Singapore OWASP chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Oct 2 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (1800h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (13:00h) - [[Taiwan|Taiwan chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 10 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 7 (15:00h) [[Germany|German chapter meeting]]''' - Restart of the German Chapter&lt;br /&gt;
&lt;br /&gt;
'''Sept (12:00h) - [[Belgium|Belgium OWASP Day Event]] '''&lt;br /&gt;
&lt;br /&gt;
'''Sept 6 (18:00h) - [[Kansas_City|Kansas City Chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[Chicago|Chicago Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (17:00h) - [[Israel|Israeli chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 25 (18:00h) - [[San Jose|San Jose Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 24 (17:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 (11:00h) - [[Turkey|Turkey chapter meeting - 1st Web Security Days]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 6 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30h) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 22 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 21 (19:00h) - [[Denver]]''' - Anti-DNS Pinning Attacks / Calculating Return on Security Investment (ROSI)&lt;br /&gt;
&lt;br /&gt;
'''June 19 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (08:00h) - [[Vietnam|Vietnam chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 - [[Melbourne | Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 - [[Boston]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 - [[Turkey]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 - [[Virginia (Northern Virginia)|Washington DC (VA)]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 - [[Toronto]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 - [[Belgium]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 - [[Rochester]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 - [[Israel]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 - [[New Zealand]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 - [[Italy]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Houston]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Melbourne]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Helsinki]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 - [[New Jersey]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 - [[Spain]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 - [[Turkey]]'''&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116604</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=116604"/>
				<updated>2011-09-01T18:08:45Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Our Long Island Chapter meeting is now scheduled for:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 22&lt;br /&gt;
* Location: Hofstra University, Heampstead, NY&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda: TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- *Pizza and refreshments will be provided --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): &amp;lt;!--To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. --&amp;gt; From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, September 22 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Hofstra University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114641</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114641"/>
				<updated>2011-07-26T21:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Due to Unforseen circumstances, the Long Island Chapter meeting has been rescheduled for Thursday, September 9:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 8&lt;br /&gt;
* Location: TBD&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- *Pizza and refreshments will be provided --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; &amp;lt;!-- [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 - '''Re-schedualed to Thursday, September 8'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114640</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114640"/>
				<updated>2011-07-26T21:35:47Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Due to Unforseen circumstances, the Long Island Chapter meeting has been rescheduled for Thursday, September 9:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 8&lt;br /&gt;
* Location: TBD&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- *Pizza and refreshments will be provided --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 - '''Re-schedualed to Thursday, September 8'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114639</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114639"/>
				<updated>2011-07-26T21:35:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT UPDATED - Due to Unforseen circumstances, the Long Island Chapter meeting has been rescheduled for Thursday, September 9:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, September 9&lt;br /&gt;
* Location: TBD&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- *Pizza and refreshments will be provided --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 - '''Re-schedualed to Thursday, September 8'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=114638</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=114638"/>
				<updated>2011-07-26T21:31:34Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP Calendar [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** BOULDER: Every third Thursday of the month except Nov and Dec ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** SINGAPORE: Every first Thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== 2011 ===&lt;br /&gt;
&lt;br /&gt;
'''September 8 (18:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 14 (12:30h) - [[Long_Island |Long Island Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 24 (19:00h) - [http://www.owasp.org/index.php/Ireland-Limerick Ireland-Limerick Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 3 (18:00h) - [[SanDiego|San Diego Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
=== 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Feb 10 (17:15h) - [http://www.owasp.org/index.php/Perth_Australia#Threat_Modelling_in_the_Software_Development_Lifecycle_.28Feb_2009.29 Perth Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''April 1 Boston OWASP Chapter meeting - Breaking Browsers - [http://www.owasp.org/index.php/boston Boston Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''September 15 (11:30 to 1:30 pm) Dallas OWASP Chapter meeting - Detective Work for Testers Finding Workflow-based Defects - [http://www.owasp.org/index.php/Dallas Dallas Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (17:30h) -  [http://www.owasp.org/index.php/Netherlands#Announcement_December_11th_2008:_Architectural_and_design_risk_analysis Netherlands Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (17:30h) - [https://www.owasp.org/index.php/Denmark#Local_News Denmark Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 22nd-25th - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NY/NJ Metro]'''&lt;br /&gt;
&lt;br /&gt;
'''Aug 21 (18:00h) - [http://www.owasp.org/index.php/Boulder#Next_Meeting Boulder Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (18:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 26 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:15h) - [[Helsinki|Helsinki chapter and RWSUG seminar]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:30h) - [[Cincinnati|Cincinnati chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 20 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 15 (11:00h) - [[Pune|Pune chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 12 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 6 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 5 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (13:00h) - [[Israel|OWASP Israel 2007]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Seattle|Seattle Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Sacramento|Sacramento Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (09:30h) - [[Turkey|Turkey Chapter Meeting - Izmir]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 24 (13:30h) - [[Turkey|Turkey Chapter Meeting - Ankara]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 20 (18:00h) - [[Belgium|Belgium Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Houston|Houston Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 11 (18:00h) - [[Ireland|Ireland Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (19:00h) - [[Singapore|Singapore OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 3 (18:30h) - [[Malaysia|Malaysia OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Oct 9 (19:30h) - [[Singapore|Singapore OWASP chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Oct 2 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (1800h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (13:00h) - [[Taiwan|Taiwan chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 10 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 7 (15:00h) [[Germany|German chapter meeting]]''' - Restart of the German Chapter&lt;br /&gt;
&lt;br /&gt;
'''Sept (12:00h) - [[Belgium|Belgium OWASP Day Event]] '''&lt;br /&gt;
&lt;br /&gt;
'''Sept 6 (18:00h) - [[Kansas_City|Kansas City Chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[Chicago|Chicago Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (17:00h) - [[Israel|Israeli chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 25 (18:00h) - [[San Jose|San Jose Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 24 (17:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 (11:00h) - [[Turkey|Turkey chapter meeting - 1st Web Security Days]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 6 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30h) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 22 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 21 (19:00h) - [[Denver]]''' - Anti-DNS Pinning Attacks / Calculating Return on Security Investment (ROSI)&lt;br /&gt;
&lt;br /&gt;
'''June 19 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (08:00h) - [[Vietnam|Vietnam chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 - [[Melbourne | Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 - [[Boston]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 - [[Turkey]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 - [[Virginia (Northern Virginia)|Washington DC (VA)]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 - [[Toronto]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 - [[Belgium]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 - [[Rochester]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 - [[Israel]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 - [[New Zealand]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 - [[Italy]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Houston]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Melbourne]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Helsinki]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 - [[New Jersey]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 - [[Spain]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 - [[Turkey]]'''&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114106</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114106"/>
				<updated>2011-07-18T14:26:11Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114105</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114105"/>
				<updated>2011-07-18T14:24:29Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:'''&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114104</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114104"/>
				<updated>2011-07-18T14:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:'''&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113952</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113952"/>
				<updated>2011-07-15T16:32:48Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113951</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113951"/>
				<updated>2011-07-15T16:30:31Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -5 years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks? Is this the new face of terrorism? How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
** Mobile Security - Managing these devices.  Where is the line between personal property and corporate property begin?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113950</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=113950"/>
				<updated>2011-07-15T16:29:44Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: Meeting Update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -5 years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks? Is this the new face of terrorism? How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
** Mobile Security - Managing these devices.  Where is the line between personal property and corporate property begin?&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=112009</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=112009"/>
				<updated>2011-06-11T18:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Long Island Chapter meeting will be held:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Hofstra University (Tentative)&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Topics: TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- *Lunch and refreshment will be provided --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=111978</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=111978"/>
				<updated>2011-06-09T20:56:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''The Next Long Island Chapter meeting will be held:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Hofstra University (Tentative)&lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Topics: TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- *Lunch and refreshment will be provided --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Tracy</name></author>	</entry>

	</feed>