This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Chicago"
(→General Information) |
|||
Line 21: | Line 21: | ||
== General Information == | == General Information == | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Also, we collaborate closely with the [https://www.owasp.org/index.php/Chicago_Suburbs Chicago Suburbs Chapter]. | Also, we collaborate closely with the [https://www.owasp.org/index.php/Chicago_Suburbs Chicago Suburbs Chapter]. |
Revision as of 15:08, 21 May 2015
For more information on OWASP Chicago meetings, please visit http://www.meetup.com/OWASP-Chicago-Chapter/ for more information.
Presentation History
February 18th, 2015
The next OWASP Chicago chapter will be on February 18th, 2015 from 6:00PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their Chicago headquarters location (22 West Washington Street, Chicago, IL 60602).
The event is free but registration is required. This is how your name gets to the security folks downstairs. You do not need to be an OWASP member to attend. You do not need the actual ticket but you will need to sign in with security in the lobby of the building. The event is on the 7th floor.
The general schedule is as follows:
- 6:00PM - 6:30PM - Refreshments and pizza @ Cafeteria
- 6:30PM - 6:45PM - Organizational Updates @ Auditorium
- 6:45PM - Talks or Workshops @ Auditorium
Agenda
- Application Security Automation and Governance by Michael Allen
- Android Application Security: Common Pitfalls and How To Avoid Them by Drew Suarez
General Information
Also, we collaborate closely with the Chicago Suburbs Chapter.
Introducing idb: Simplified Blackbox iOS App Pentesting by Daniel Mayer
Tips for Building a Successful Application Security Program by Clint Pollock
You Will Perish In Flames: Simple Rules For Safely Handling Crypto by Thomas Ptacek
A9: Discovering Vulnerable Components with OWASP Dependency-Check by Steve Springett
How to Get the Most Out of Your Security Consulting Experience by Erin Ptacek
Repsheet: A Behavior Based Approach to Web Application Security by Aaron Bedra
Forget About BYOD: Develop a Realistic Mobile Security Policy by Tom Bain
Android Internals: From Forensics to Vulnerabilities by Drew Suarez
An Application Pen Tester’s Intro to Android Internals by Tom Palarz
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides here
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides here
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides here
Automated Thrash Testing - Andre Gironda - Presentation slides here
Defeating Information Leak Prevention - Eric Monti - Presentation slides here
[1]Webapps In Name Only Thomas Ptacek, Matasano Security
[2]Token-less strong authentication for web applications: A Security Review Cory Scott, ABN AMRO
[3]Secure Password Storage John Steven, Cigital
[4]Stripe CTF 2.0; A Walkthrough Jeff Jarmoc, Dell SecureWorks and Zack Fasel, Dubsec Labs
Chicago OWASP Chapter Leaders
- John Downey
- Aaron Bedra
- Matt Konda
- Vitaly McLain