This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Meeting Dates & Location)
(Meeting Dates & Location)
Line 40: Line 40:
 
reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout.
 
reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout.
  
<font color="#FF0000"><b>Due to limited space, we are requesting that you [mailto:[email protected] RSVP] by Novermber 13.</b>/<font>
+
<font color="#FF0000"><b>Due to limited space, we are requesting that you [mailto:[email protected] RSVP] by Novermber 13.</b></font>
  
 
== Past Presentations ==
 
== Past Presentations ==

Revision as of 22:14, 4 November 2006

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leader is Ralf Durkee

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announce list is for official communications (e.g meeting announcements, web site upates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found here. The discussion mailing list can be found here. You can also review the announce and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to announce to receive any last minute meeting info.

Local Officers

    • President: Ralf Durkee
    • Vice President: Chris Karr
    • Secretary and Treasurer: Steve Buck
    • Web and Communications: Michael Starks

Meeting Dates & Location

Dates: The third Monday of every month, starting at 6:00 PM.

Location: 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) Google Map

Meeting space is graciously offered by Bryant & Stratton College Enter the Frontier Commons plaza, near the Post Office. Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant & Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.

For this meeting, we'll be gathering in room 204. Enter the the main Bryant & Stratton entrance door, go up the stairs and turn left down the hallway to room 204. There will also be a signs on the doors.

November Meeting Details

Date: Monday, November 20, 2006, 6:00 PM

Duration: 1 hour 30 minutes Intended audience: Technical, Technical Management

Presentation: Making Source Code Analysis Part of the Security Review Process, by Matt Rose, Fortify Software.

How do you know if your software applications are secure? Manual audits only cover a small percentage of the source code base and periodic checks only provide a snapshot in time. Source code analysis allows development organizations to manage software security by leveraging well-documented best practices that can be automated. This session will reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the ins and outs of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout.

Due to limited space, we are requesting that you RSVP by Novermber 13.

Past Presentations

October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint