<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Rochester_Meeting_Archive</id>
		<title>Rochester Meeting Archive - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Rochester_Meeting_Archive"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester_Meeting_Archive&amp;action=history"/>
		<updated>2026-05-15T09:00:32Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester_Meeting_Archive&amp;diff=247292&amp;oldid=prev</id>
		<title>Jkeeler: Created an archive page for old Rochester meetings.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester_Meeting_Archive&amp;diff=247292&amp;oldid=prev"/>
				<updated>2019-02-12T02:00:51Z</updated>
		
		<summary type="html">&lt;p&gt;Created an archive page for old Rochester meetings.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;;Rochester Security Summit 2017&lt;br /&gt;
Date: Oct 19-20, 2017&lt;br /&gt;
&lt;br /&gt;
OWASP Track (day 2):&lt;br /&gt;
* Keynote: David Kennedy&lt;br /&gt;
* Beyond the Top 10 (John N. King, Mary Beth King)&lt;br /&gt;
* How Billion Dollar Enterprises Manage Application Security at Scale (Altaz Valani)&lt;br /&gt;
* Almost Intractable Application Security Problems… and Solutions (Danny Harris)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joint OWASP-ISSA Rochester Chapter Meeting'''&amp;lt;br /&amp;gt;&lt;br /&gt;
July 13, 2017&amp;lt;br /&amp;gt;&lt;br /&gt;
6:00pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Nixon Peabody&amp;lt;br /&amp;gt;&lt;br /&gt;
1300 Clinton Square, 14th Floor&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''How Billion Dollar Enterprises Manage Application Security at Scale'''&lt;br /&gt;
&lt;br /&gt;
Security Compass recently completed a research study by surveying companies across multiple industries with the goal of discovering how large, complex organizations address application security at scale.  The majority of respondents surveyed were multinational organizations who reported annual earnings greater than $1 billion USD.  Through this new research study, we have gleamed novel insights on how large organizations manage application security at scale.  Through this presentation, we will reveal aggregated insights, industry trends, and best practices that illuminate how organizations are addressing application security at scale, so that you may apply and compare these learnings to the state of application security at your own organization.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Altaz Valani'''&lt;br /&gt;
&lt;br /&gt;
Altaz Valani is a Research Director at Security Compass responsible for managing the overall research vision and team.  Prior to joining Security Compass, Altaz was a Senior Research Director in the Application Development Practice at Info-Tech Research Group providing IT managers, directors, and senior managers with guidance and analysis around application development – including Agile, Cloud, Mobile, and the overall SDLC.  His other past positions include Senior Manager at KPMG, and various entrepreneurial and intrapreneurial positions where he worked side by side with senior-level stakeholders at blue chip clients to drive business value through software development.&lt;br /&gt;
 &lt;br /&gt;
Altaz enjoys coding, teaching, and the challenge of learning.  He received his BEng in Computer Engineering from McMaster University, and his MBA from the University of Western Ontario.&lt;br /&gt;
AltazMAS!&lt;br /&gt;
&lt;br /&gt;
'''Parking'''&lt;br /&gt;
&lt;br /&gt;
Free parking is available underneath the building. Please bring your ticket with you for validation.&lt;br /&gt;
&lt;br /&gt;
Entrance for parking:&lt;br /&gt;
https://www.google.com/maps/dir/43.1558628,-77.605952/@43.1556506,-77.6077177,17.12z&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Rochester Chapter Event'''&lt;br /&gt;
March 1, 2017&amp;lt;br /&amp;gt;&lt;br /&gt;
6:00pm to 7:15pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Nixon Peabody&amp;lt;br /&amp;gt;&lt;br /&gt;
1300 Clinton Square, 13th Floor&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Introduction to Application Security and OWASP Top 10 Risks (part 2 of 2)'''&lt;br /&gt;
&lt;br /&gt;
Want to learn more about the security challenges developers face? This session will provide easy to understand, demo-driven examples of four common application vulnerabilities. You’ll see the attack in action, learn how the attack works, learn how it can be prevented, and watch a successful defensive counter.&lt;br /&gt;
&lt;br /&gt;
This session will be covering the following components of the OWASP Top 10:&lt;br /&gt;
&lt;br /&gt;
* A1 – Injection&lt;br /&gt;
* A3 – Cross-Site Scripting (XSS)&lt;br /&gt;
* A8 – Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A10 – Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
The source code used in the demo is freely available and uses a Java/JEE stack.&lt;br /&gt;
&lt;br /&gt;
'''Slides:'''&lt;br /&gt;
http://www.johnnking.com/slides/owasp2017/&lt;br /&gt;
&lt;br /&gt;
'''Source code:'''&lt;br /&gt;
https://github.com/JohnNKing/appsecdemo&lt;br /&gt;
&lt;br /&gt;
'''Speaker: John King'''&lt;br /&gt;
&lt;br /&gt;
John is an experienced developer with a special focus on application security, enterprise software, and Agile product development. He’s a Senior Web Programmer / Analyst for RIT, an Officer of the Rochester Chapters of ISSA and OWASP, and has been a contributor to the Rochester Security Summit for the past four years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Rochester Chapter Event'''&lt;br /&gt;
November 18, 2016&amp;lt;br /&amp;gt;&lt;br /&gt;
Noon to 1:15pm&amp;lt;br /&amp;gt;&lt;br /&gt;
RIT, GCCIS&amp;lt;br /&amp;gt;&lt;br /&gt;
GOL-2130 (Air Gap Lab)&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Application Security and OWASP Top 10 Risks (part 1 of 2)'''&lt;br /&gt;
&lt;br /&gt;
Application Security is really hot and very much in demand. Find out why it’s so hot and get an in-depth introduction to application security and 6 of the OWASP Top 10 Application Risks. Ralph will discuss the how-to of the exploits and defenses for:&lt;br /&gt;
&lt;br /&gt;
* A2 – Broken Authentication and Session Management&lt;br /&gt;
* A4 – Insecure Direct Object References&lt;br /&gt;
* A5 – Security Misconfiguration&lt;br /&gt;
* A6 – Sensitive Data Exposure&lt;br /&gt;
* A7 – Missing Function Level Access Control&lt;br /&gt;
* A9 – Using Components with Known Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
;Slides [[Media:Durkee_OWASP_Top_10_2016_11_v11.pdf]] &lt;br /&gt;
&lt;br /&gt;
'''Speaker: Ralph Durkee'''&lt;br /&gt;
&lt;br /&gt;
Ralph is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit. He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in advanced penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 – Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, GPEN and GXPN. &lt;br /&gt;
;&lt;br /&gt;
;Rochester Security Summit 2016&lt;br /&gt;
Date: Oct 5-6, 2016&lt;br /&gt;
&lt;br /&gt;
OWASP Track (day 2):&lt;br /&gt;
* Keynote: Jeremiah Grossman&lt;br /&gt;
* Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee &amp;amp; John King)&lt;br /&gt;
* Common Developer Crypto Mistakes (Kevin W. Wall)&lt;br /&gt;
* #DevOpsSec – Killing the Buzz? (Jason Ross)&lt;br /&gt;
* Web Application Firewall Evaluation with DevOps, SDLC and the New OWASP Core Rule Set (Chaim Sanders)&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;OWASP Rochester Social Event (8/11/16, MacGregors')&lt;br /&gt;
Please join the Rochester OWASP chapter for a social event August 11th at MacGregors' in Henrietta.&lt;br /&gt;
&lt;br /&gt;
Come out and discuss your favorite topics in application security! Appetizers will be provided.&lt;br /&gt;
&lt;br /&gt;
When: Thursday, August 11 at 5:30pm&lt;br /&gt;
&lt;br /&gt;
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;Understanding and Preventing Cross-Site Request Forgery Attacks&lt;br /&gt;
Date:  Feb 10th, 12 Noon - 1:30pm&lt;br /&gt;
Location: Univ of Rochester College Town – Building 3 &lt;br /&gt;
;Speaker: John King&lt;br /&gt;
;Slides http://www.johnnking.com/slides/csrf/&lt;br /&gt;
&lt;br /&gt;
Ranked #8 on the OWASP Top 10, “Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.” (OWASP Wiki)&lt;br /&gt;
&lt;br /&gt;
CSRF vulnerabilities are commonplace and easily missed by developers who are unfamiliar with this class of attack. Unlike injection vulnerabilities, they do not become apparent during testing unless you know exactly what to look for. This session will provide an introduction to CSRF vulnerabilities, and will include an attack demonstration and practical examples that prevent this type of vulnerability.&lt;br /&gt;
&lt;br /&gt;
John is a web application developer with 10+ years of experience, with a focus on product management, user-experience, and application security. He has recently joined RIT ITS as a Senior Web Programmer / Analyst. He also serves as an officer of the Rochester chapters of OWASP and ISSA, and helps plan the annual Rochester Security Summit.&lt;br /&gt;
;NodeJS Security&lt;br /&gt;
Date:  Nov 6th 12 noon - 1:30pm&lt;br /&gt;
Location: Univ of Rochester College Town – Building 3 &lt;br /&gt;
;Speaker: Jason Ross&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Presentation Slides: https://www.owasp.org/images/e/ec/Durkee_OWASP_2015_09_AppSec.pdf&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows. &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit 2014&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br /&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br /&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br /&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br /&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br /&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;/div&gt;</summary>
		<author><name>Jkeeler</name></author>	</entry>

	</feed>