This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Rochester"
(→Meeting Dates & Location) |
(→Meeting Dates & Location) |
||
Line 40: | Line 40: | ||
reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout. | reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout. | ||
− | <font color="#FF0000"><b>Due to limited space, we are requesting that you [mailto:[email protected] RSVP] by Novermber 13.</b>/ | + | <font color="#FF0000"><b>Due to limited space, we are requesting that you [mailto:[email protected] RSVP] by Novermber 13.</b></font> |
== Past Presentations == | == Past Presentations == |
Revision as of 22:14, 4 November 2006
Welcome to the OWASP Rochester Local Chapter
Welcome to the local Rochester chapter homepage. The chapter leader is Ralf Durkee
Participation
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.
The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announce list is for official communications (e.g meeting announcements, web site upates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found here. The discussion mailing list can be found here. You can also review the announce and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to announce to receive any last minute meeting info.
Local Officers
- President: Ralf Durkee
- Vice President: Chris Karr
- Secretary and Treasurer: Steve Buck
- Web and Communications: Michael Starks
Meeting Dates & Location
Dates: The third Monday of every month, starting at 6:00 PM.
Location: 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) Google Map
Meeting space is graciously offered by Bryant & Stratton College Enter the Frontier Commons plaza, near the Post Office. Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant & Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.
For this meeting, we'll be gathering in room 204. Enter the the main Bryant & Stratton entrance door, go up the stairs and turn left down the hallway to room 204. There will also be a signs on the doors.
November Meeting Details
Date: Monday, November 20, 2006, 6:00 PM
Duration: 1 hour 30 minutes Intended audience: Technical, Technical Management
Presentation: Making Source Code Analysis Part of the Security Review Process, by Matt Rose, Fortify Software.
How do you know if your software applications are secure? Manual audits only cover a small percentage of the source code base and periodic checks only provide a snapshot in time. Source code analysis allows development organizations to manage software security by leveraging well-documented best practices that can be automated. This session will reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout.
Due to limited space, we are requesting that you RSVP by Novermber 13.
Past Presentations
October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint
April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF
February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF
February 2006 Secure e-mail, by Thomas Bullinger PDF
January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF
September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office
April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office
March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office
February 2005 Insecure Storage, by Chris Karr PowerPoint
January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office
November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint