This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Washington DC"

From OWASP
Jump to: navigation, search
 
(47 intermediate revisions by 8 users not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
  
Welcome =
+
{{Chapter Template|chaptername=Washington DC|extra=The chapter leaders are [mailto:emily.verwee@owasp.org Emily Verwee], [mailto:andrew.weidenhamer@owasp.org Andrew Weidenhamer] and [mailto:Bryan.Batty@owasp.org Bryan Batty].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/Owasp-washington|emailarchives=http://lists.owasp.org/pipermail/Owasp-washington}}
 +
 
 +
== Local News ==
 +
 
 +
  '''Next Meeting - The Groovy Landscape & Grails Security''' 6:30PM Thursday, July 10th UberOffices - 1200 18th Street, NW, Suite 700, Washington, DC
 +
 
 +
Everyone is welcome to join us at our chapter meetings.
 +
 
  
 
Welcome to the Home Page of the Washington DC OWASP Chapter.<br><br>
 
Welcome to the Home Page of the Washington DC OWASP Chapter.<br><br>
  
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.
+
* Please checkout our Meetup page (http://www.meetup.com/OWASPDC/) for the latest announcements or subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting information.
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.
+
 
 
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]
 
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]
 +
 
* Our recent meetings are documented on the News & Meetings tab.
 
* Our recent meetings are documented on the News & Meetings tab.
 +
 
* You can also check out the archives of this page here [[Washington_DC Archives]].
 
* You can also check out the archives of this page here [[Washington_DC Archives]].
 +
  
 
= Meetings & Events =
 
= Meetings & Events =
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.
 
  
'''Next Meeting'''
+
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.<br><br>
  
TBD<br>
+
'''Next Meeting - The Groovy Landscape & Grails Security'''
  
 +
The next meeting will be on Thursday, July 10, 2014 from 6:30 PM to 8:30 PM (EDT) at
 +
 +
'''Location:''' UberOffices - 1200 18th Street, NW, Suite 700, Washington, DC
 +
 +
Please RSVP for the event here: http://www.meetup.com/OWASPDC/
 +
 +
'''Presentation Overview:'''
 +
1st Talk - "The Groovy Landscape"
 +
 +
This talk is geared to those who are new to Groovy and the goal is to put the Groovy language in is proper context. We will try to answer the following questions:
 +
 +
What are the properties of the language?
 +
When and why was it developed?
 +
Who is using it and who maintains it?
 +
Where can I use it?
 +
How do I get started or contribute to development?
 +
 +
2nd Talk - "Grails Security"
 +
 +
Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.
 +
 +
'''Speaker:'''
 +
David James -  David is a software developer and consultant who helps enterprise clients deliver software that makes a business impact. He has been developing applications on the JVM for fifteen years and leverages Groovy on a daily basis. David is involved in the Arlington coworking community and is the founder of the DC Groovy user group.
 +
 +
Cyrus Malekpour - Cyrus (@cmalekpour) is a software developer at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development. Most of his passion is in designing and developing secure applications, but he also has an interest in breaking into things. In his free time, he likes to read, watch movies, and cycle.
  
 
= Participation =
 
= Participation =
 
 
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.
 
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.
  
Line 27: Line 60:
 
= Twitter =
 
= Twitter =
 
<!-- Twitter Box --> {|
 
<!-- Twitter Box --> {|
| style="border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);" |
 
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' <twitter>23609877</twitter>
 
  
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |  
+
| style="border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);" |
 +
 
 +
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' <twitter>23609877</twitter>
 +
 
 +
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |
 +
 
 
|}
 
|}
  
 +
= News & Recent Meetings =
 +
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br><br>
 +
 +
'''May 2014 Meeting'''
 +
 +
'''Presentation Overview:''' As mobile dating applications grow in popularity, so does our interest in the security posture behind them. There are a vast number of mobile dating applications available for use today by anyone with a smart phone. We wanted to take a look at numerous features within these apps to determine the good, the bad, and the ugly.
 +
 +
We will cover popular features such as location-based services, analytics, sharing of information, in-app purchasing, and any other features we discover to be interesting. We will analyze the type of personal data being stored within these applications, communication channels used to transmit information, hardware interaction with the application, and interaction with other applications on the device. We will answer the big questions posed by those who use these apps or want to use these apps: Are these applications disclosing sensitive information? How private is the communication between me and another user? How can I be sure my data is being protected?
 +
 +
This talk will feature highlights from popular, obscure, and scary dating applications to answer a simple question: “Can you find love on the Internet without having your personal data exposed?”
 +
 +
'''Speaker:'''
 +
Jack Mannino is an Application Security expert with over a decade of experience building, breaking, and securing into complex systems. Jack is Co-Founder and CEO of nVisium, while also leading research and development initiatives. With experience developing in Java, Objective-C, and C#, he performs risk assessments and penetration tests for Fortune 500 companies and government agencies. Jack also founded and leads the OWASP Mobile Application Security Project, which is a global initiative to build secure development standards for mobile. He is an active Android security researcher with a keen interest in large-scale security analysis.
 +
 +
Abdullah Munawar is an Application Security consultant at nVisium who specializes in mobile application testing and ripping apart new things. With over 7 years of experience, Abdullah previously worked on the security teams at financial and aviation organizations. Abdullah attempts humor on a daily basis and succeeds most of the time, every time.
 +
 +
'''March 2014 Meeting'''
 +
 +
'''Presentation Overview:''' How is identity and access management (IAM) implemented in your in-house applications?  Do the developers who implement it have IAM expertise?  Does every team implement their own IAM?
 +
Enterprise framework development teams with IAM expertise can address the problem by creating APIs that enable developers without IAM expertise to implement the IAM correctly.  This presentation explains what an enterprise identity API is, why it's worthwhile to create one and how it might be done.
 +
 +
'''Speaker:'''
 +
Adam Migus (@amigus) - Adam currently works as an IT architect helping his clients devise and execute technology strategy. Prior to that he was a Principal Security Architect at E*TRADE Financial where he created APIs as a means to improve software security. Adam believes that software quality is critical to software security and that many application security concerns can be addressed through enterprise APIs.  He's also held positions at McAfee and Symantec.  He earned his B.Sc. in Computer Science from Memorial University of Newfoundland, where he also started his career in earnest as a network administrator.
 +
 +
'''February 2014 Meeting'''
 +
 +
'''Presentation Overview:''' Bojan Simic will provide a short background into Bitcoin and how it works. He will then provide some of his firsthand experiences with the state of Bitcoin businesses with regard to security and how many individuals are (insecurely) handling their Bitcoins. These experiences will demonstrate some "hacks" that pertain to the OWASP Top 10 as well as other types of vulnerabilities. The talk will include an overview of simple security steps that individuals and businesses who are working with Bitcoin should take to in order to mitigate the chance of hackers stealing Bitcoin and Personally Identifiable Information (PII) from them and their customers.
 +
 +
'''Speaker:'''
 +
Bojan is a security engineer in the industry as well as the founder and main contributor to the Bitcoin Security Project (https://bitcoinsecurityproject.org). The project is a free and open source resource that is dedicated to spreading security awareness across the Bitcoin community by helping individual bitcoin holders and businesses follow security best practices. These practices ensure better security of individual holders' investments and Bitcoin business customers.
 +
 +
Professionally, Bojan has performed hundreds of penetration tests, threat modeling, and security code reviews of different applications. These reviews identify vulnerabilities associated with software, the network software, and infrastructure they are deployed on. He also performs research in the field of web application security and teaches developer training on web application best practices, architecture, and security.
 +
 +
'''January 2014 Meeting'''
 +
 +
'''Summary''':
 +
This talk will include how organizations build AppSec programs, how to gain Executive and organizational-wide acceptance to your AppSec program and the current trends within the application security industry.
 +
 +
If you have a specific question you would like discussed please just send Rinaldi or Mike McCabe an email and they will try to incorporate it into the talk.
 +
 +
Let's help each other start off 2014 strong in implementing your AppSec goals/resolutions! We understand you may have an unique environment but there are common themes between disparate environments. We can learn from the those themes and you can take them to your place of development and apply them accordingly. This discussion will be appealing to developers, project/program managers, application security leads and security professionals.
 +
 +
""Bios"":
 +
We are going to kick-off the year in a panel format with experts in the industry from the DC area. The panel will include:
 +
 +
• Lee Aber, Director, Information Security at Opower
 +
• Kevin Greene, Software Assurance Program Manager at DHS S&T
 +
• Rich Ronston, Director, Security at Deltek
 +
• Jack Mannino, Chief Security Officer at nVisium & OWASP NoVA Lead [Moderator]
 +
 +
 +
'''July 2012 Meeting'''
  
= News & Recent Meetings =
+
'''Topic''': OWASP Top Ten Tools and Tactics
 +
 
 +
'''Abstract''': If you've spent any time defending web applications as a security analyst, or perhaps as a developer seeking to adhere to SDLC practices, you have likely utilized or referenced the OWASP Top 10. Intended first as an awareness mechanism, the Top 10 covers the most critical web application security flaws via consensus reached by a global consortium of application security experts. The OWASP Top 10 promotes managing risk in addition to awareness training, application testing, and remediation. To manage such risk, application security practitioners and developers need an appropriate tool kit. This presentation will explore tooling, tactics, analysis, and mitigation for each of the Top 10. This discussion is a useful addition for attendees of Security 542: Web App Penetration Testing and Ethical Hacking.
 +
 
 +
'''Bio''': Russ McRee is a senior security analyst, researcher, and founder of holisticinfosec.org, where he advocates a holistic approach to the practice of information assurance. As manager of Microsoft Online Service's Security Incident Management team his focuses are incident response and web application security. He writes toolsmith, a monthly column for the ISSA Journal, and has written for numerous other publications including Information Security, (IN)SECURE, and OWASP. Russ speaks regularly at conferences such as DEFCON, Black Hat, RSA, FIRST, RAID, SecureWorld Expo, as well as ISSA events. IBM's ISS X-Force cited him as the 6th ranked Top Vulnerability Discoverers of 2009. Additionally, Russ volunteers as a handler for the SANS Internet Storm Center (ISC).
 +
 
 +
'''8:15-9:15 Speaker''': Kevin Johnson
 +
 
 +
'''Topic''': Ninja Assessments: Stealth Security Testing for Organizations
 +
 
 +
'''Abstract''': Organizations today need to be able to easily integrate security testing within their existing processes. In this talk, Kevin Johnson of Secure Ideas will explore various techniques and tools to help organizations assess the security of the web applications. These techniques are designed to be implemented easily and with little impact on the work load of the staff.
 +
 
 +
'''Bio''': Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.
 +
 
 +
'''May 2012 Meeting'''
 +
 
 +
'''Speaker''': Rohit Sethi, Vice President, Product Development, SD Elements
 +
 
 +
'''Topic''': Is There An End to Testing Ourselves Secure?
 +
 
 +
'''Abstract''': Despite years of research on best practices to integrate security into the early phases of the SDLC, most organizations rely on static analysis, dynamic analysis, and penetration testing as their primary means of eliminating vulnerabilities. This approach leads to discovering vulnerabilities late in the development process,  thereby either causing project delays or risk acceptance.
 +
 
 +
This talk is an open discussion about the presence, if any, of scalable, measurable, approaches working to address security into the SDLC.  Consideration for how Agile development impacts effectiveness will be explored.
 +
 
 +
Points of discussion include:
 +
 
 +
·        Is static analysis sufficient?
 +
·        Developer awareness training
 +
·        Threat modeling / architecture analysis
 +
·        Secure requirements
 +
·        Considerations for procured applications
 +
 
 +
'''Bio''': Rohit Sethi is a specialist in building security controls into the software development life cycle (SDLC). Rohit is a SANS course developer and instructor on Secure J2EE development. He has spoken and taught at FS-ISAC, RSA, OWASP, Shmoocon, CSI National, Sec Tor, Infosecurity New York and Toronto, TASK, the ISC2's Secure Leadership series conferences, and many others. Mr. Sethi has written articles for Dr. Dobb's Journal, TechTarget, Security Focus and the Web Application Security Consortium (WASC), and he has been quoted as an expert in application security for ITWorldCanada and Computer World. He also leads the OWASP Design Patterns Security Analysis project.
 +
 
 +
Register for the meeting at http://owaspdc.eventbrite.com/
 +
 
 +
'''March 2012 Meeting'''
 +
 
 +
March 15th at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.<br>
 +
 
 +
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 +
 
 +
'''Speaker''': Alissa Torres
 +
 
 +
'''Topic''': Application Footprinting
 +
 
 +
'''Abstract''': Application footprinting is a great skill for forensic examiners (and anyone interested in binary research) because it allows you to marry artifacts in the registry/file creation/time/date stamps with specific applications or user initiated events.  Eventually, during the course of an investigation, an examiner is going to run into a "new" problem - one that hasn't previously been experienced/researched by others in the field.  Application footprinting is a simple method that examines the interaction of a program with the operating system.  The process of footprinting will determine if the application was installed on the system being investigated, what trace evidence exists and how that can be mined.  This presentation will include a demo of Active Registry Monitor and its use in tracking changes made to the Windows Registry by an open source ssh client.
  
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br>
+
'''Bio''': Alissa Torres currently works as a security researcher for KEYW Corporation in Maryland and has 10 years technical expertise in the information technology field. Previously, she was a digital forensic investigator on a government contractor security team. She has extensive experience in information security, spanning government, academic and corporate environments and holds a Bachelor’s degree from University of Virginia and a Master’s from University of Maryland in Information Technology. Alissa taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), teaching incident response and network basics to security professionals entering the forensics community. In addition, she has presented at various industry conferences and currently holds the following industry certifications: GCFA, CISSP, EnCE.
  
 
'''December 2011 Meeting'''
 
'''December 2011 Meeting'''
  
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
+
'''The December 21st meeting was held at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
  
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>
  
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages  
+
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages
 +
 
 
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''
 
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''
 +
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!
 
  
 
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.
 
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.
 
  
 
'''About our Speakers'''
 
'''About our Speakers'''
  
 
:'''Ken Johnson'''
 
:'''Ken Johnson'''
 
 
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty<br><br>
 
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty<br><br>
  
 
:'''Chris Gates'''
 
:'''Chris Gates'''
 
+
::TBD<br>
::TBD<br><br>
 
  
 
::'''Abstract: Updates in wXf''' - Coming Soon<br>
 
::'''Abstract: Updates in wXf''' - Coming Soon<br>
 
 
  
 
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037]'''
 
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037]'''
Line 74: Line 204:
 
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''
 
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.
 
  
 
'''About our Speakers'''
 
'''About our Speakers'''
 
 
:'''John Steven'''
 
:'''John Steven'''
  
 
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security & Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.
 
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security & Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.
<br><br>
+
 
 +
<br>
 +
 
 
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess "Holistic Assessment" schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?
 
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess "Holistic Assessment" schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?
  
Line 87: Line 217:
  
 
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.
 
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.
<br><br>
+
 
 +
<br>
 +
 
 
:'''Krystal Moon'''
 
:'''Krystal Moon'''
  
Line 95: Line 227:
  
 
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.
 
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.
<br><br>
+
 
 +
<br>
 +
 
 
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.
 
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.
+
 
 
:::'''Secure Coding'''
 
:::'''Secure Coding'''
 +
 
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.
 
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.
+
 
 
:::'''Architecture and Design Considerations for Secure Software'''
 
:::'''Architecture and Design Considerations for Secure Software'''
 +
 
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both "the process of defining the architecture, components, interfaces, and other characteristics of a system or component" and "the result of [that] process." The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.
 
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both "the process of defining the architecture, components, interfaces, and other characteristics of a system or component" and "the result of [that] process." The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.
  
 +
Facility Sponsor: <!-- Currently Open -->Anonymous&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}<!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} -->
  
Facility Sponsor: <!-- Currently Open -->Anonymous&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}<!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} -->
 
 
<br>
 
<br>
 
  
 
'''August 2011 Meeting'''
 
'''August 2011 Meeting'''
  
 
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.
 
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.
 +
 
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.
 
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.
 +
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br>
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br>
 +
 
<br>
 
<br>
 +
 
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.
 
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.
 
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''
 
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''
 
* Doug Wilson & Mark Bristow will update on current and upcoming events.
 
* Doug Wilson & Mark Bristow will update on current and upcoming events.
 
  
 
'''About our Speaker'''
 
'''About our Speaker'''
 
 
:'''Julian Cohen'''
 
:'''Julian Cohen'''
  
Line 133: Line 270:
  
 
<br>
 
<br>
 +
 
Facility Sponsor: [http://www.livingsocial.com Living Social]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: [http://www.livingsocial.com Living Social]&nbsp;&nbsp;[http://www.stratumsecurity.com Stratum Security]
 
Facility Sponsor: [http://www.livingsocial.com Living Social]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: [http://www.livingsocial.com Living Social]&nbsp;&nbsp;[http://www.stratumsecurity.com Stratum Security]
<br><br><br><br><br>
+
 
 +
<br><br>
  
 
'''July 2011 Meeting'''
 
'''July 2011 Meeting'''
  
 
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')
 
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here]  
+
 
 +
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here]
 
* Jack Mannino will speak on '''Building Secure Android Applications'''
 
* Jack Mannino will speak on '''Building Secure Android Applications'''
 
* Doug Wilson & Mark Bristow will update on current and upcoming events.
 
* Doug Wilson & Mark Bristow will update on current and upcoming events.
 
  
 
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room
 
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room
 
  
 
'''About our Speakers'''
 
'''About our Speakers'''
Line 164: Line 302:
  
 
<br>
 
<br>
 +
 
Facility Sponsor: Anonymous&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}
 
Facility Sponsor: Anonymous&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}
 +
 
<br><br><br><br><br>
 
<br><br><br><br><br>
  
Line 170: Line 310:
  
 
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)
 
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)
 +
 
* Jeff Ennis from Veracode will be presenting on Application Risk Management
 
* Jeff Ennis from Veracode will be presenting on Application Risk Management
 
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security
 
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security
Line 179: Line 320:
 
'''Jeff Ennis'''
 
'''Jeff Ennis'''
  
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..  Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin.  
+
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..  Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin.
  
 
:'''Abstract'''
 
:'''Abstract'''
Line 212: Line 353:
 
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.
 
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.
 
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.
 
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.
 
  
 
'''XAB -- The Abstract:'''
 
'''XAB -- The Abstract:'''
Line 221: Line 361:
  
 
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.
 
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.
 
  
 
'''About our speakers:'''
 
'''About our speakers:'''
Line 233: Line 372:
  
 
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.
 
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.
 
  
 
'''Jeff Yestrumskas'''
 
'''Jeff Yestrumskas'''
Line 239: Line 377:
  
 
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.
 
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.
 
 
  
 
'''August 2009 Meeting'''
 
'''August 2009 Meeting'''
Line 250: Line 386:
  
 
About our speakers:
 
About our speakers:
 +
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.
  
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.
 
 
 
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.
 
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.
  
Line 258: Line 393:
  
 
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.
 
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.
 
  
 
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.
 
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.
  
 
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.
 
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.
 
  
 
'''April Meeting Debrief'''
 
'''April Meeting Debrief'''
Line 272: Line 405:
  
 
We'd also like to thank:
 
We'd also like to thank:
 +
 
* George Washington University and their great staff for the meeting space and A/V support
 
* George Washington University and their great staff for the meeting space and A/V support
 
* Securicon and Mark Bristow for arranging refreshements.
 
* Securicon and Mark Bristow for arranging refreshements.
  
 
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!
 
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!
 
  
 
'''April 22nd 6:30 PM OWASP Meeting, Washington DC
 
'''April 22nd 6:30 PM OWASP Meeting, Washington DC
Line 299: Line 432:
  
 
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]
 
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]
 
  
 
''Note on Transportation and Parking''
 
''Note on Transportation and Parking''
Line 305: Line 437:
 
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center
 
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center
  
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.  
+
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.
 
 
 
 
  
 
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''
 
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''
Line 323: Line 453:
  
 
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008
 
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008
 
  
 
''Note on Transportation and Parking''
 
''Note on Transportation and Parking''
Line 330: Line 459:
  
 
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.
 
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.
 
  
 
'''December Meeting Debrief'''
 
'''December Meeting Debrief'''
  
I'd like to take this opportunity to once again thank Kevin for coming
+
I'd like to take this opportunity to once again thank Kevin for coming out to talk to us at the meeting Wednesday.  I thought his presentation on Samurai, Yokoso!, Laudanum, and Social butterfly
out to talk to us at the meeting Wednesday.  I thought his
+
demonstrated some of the great up and coming tools that are available to the community.  As promised, I uploaded the PDF of the presentationto the Wiki, but the slides don't do the commentary justice.  It can be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly
 
demonstrated some of the great up and coming tools that are available
 
to the community.  As promised, I uploaded the PDF of the presentation
 
to the Wiki, but the slides don't do the commentary justice.  It can
 
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].
 
  
 
We also took care of some housekeeping stuff:
 
We also took care of some housekeeping stuff:
 +
 
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.
 
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.
 
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!
 
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here]  
+
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here]
 
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].
 
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].
  
To those who attended the meeting on Wednesday, thanks for coming out,
+
To those who attended the meeting on Wednesday, thanks for coming out, we had a great turnout and I hope to have even more attendees next time.  For those who were unable to attend, I hope to see you all at our next meeting.
we had a great turnout and I hope to have even more attendees next
 
time.  For those who were unable to attend, I hope to see you all at
 
our next meeting.
 
 
 
  
 
'''December 10th 6:30pm OWASP Meeting, Washington DC'''
 
'''December 10th 6:30pm OWASP Meeting, Washington DC'''
Line 371: Line 491:
  
 
You can RSVP to the event on Upcoming.org:
 
You can RSVP to the event on Upcoming.org:
 +
 
http://upcoming.yahoo.com/event/1334575
 
http://upcoming.yahoo.com/event/1334575
 
  
 
'''October 15th 6:30pm OWASP Meeting, Washington DC'''
 
'''October 15th 6:30pm OWASP Meeting, Washington DC'''
Line 389: Line 509:
  
 
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.
 
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.
 
 
  
 
= History =
 
= History =
Line 403: Line 521:
  
  
<headertabs />  
+
<headertabs />
 +
 
 
<br>
 
<br>
 +
 
<br>
 
<br>
 +
 
<br>
 
<br>
 +
 
<paypal>Washington DC</paypal>
 
<paypal>Washington DC</paypal>
 +
 
<br>
 
<br>
 +
 
<br>
 
<br>
 +
 
September Meeting:<br>
 
September Meeting:<br>
 +
 
<br>
 
<br>
Facility Sponsor: [http://www.livingsocial.com Living Social]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: Still Open!<!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} -->
+
 
 +
Facility Sponsor: [http://www.uberoffices.com UberOffices]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  Refreshment Sponsor: Still Open!<!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} -->
 +
 
 
<br>
 
<br>
 +
 
<br>
 
<br>
 +
 +
  
 
[[Category:OWASP Chapter]]
 
[[Category:OWASP Chapter]]
 +
 
[[Category:Washington, DC]]
 
[[Category:Washington, DC]]
 +
 
[[Category:Maryland]]
 
[[Category:Maryland]]

Latest revision as of 19:43, 26 September 2018


OWASP Washington DC

Welcome to the Washington DC chapter homepage. The chapter leaders are Emily Verwee, Andrew Weidenhamer and Bryan Batty.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local News

Next Meeting - The Groovy Landscape & Grails Security 6:30PM Thursday, July 10th UberOffices - 1200 18th Street, NW, Suite 700, Washington, DC

Everyone is welcome to join us at our chapter meetings.


Welcome to the Home Page of the Washington DC OWASP Chapter.

  • You can follow us on Twitter as @OWASPDC
  • Our recent meetings are documented on the News & Meetings tab.


Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.

Next Meeting - The Groovy Landscape & Grails Security

The next meeting will be on Thursday, July 10, 2014 from 6:30 PM to 8:30 PM (EDT) at

Location: UberOffices - 1200 18th Street, NW, Suite 700, Washington, DC

Please RSVP for the event here: http://www.meetup.com/OWASPDC/

Presentation Overview: 1st Talk - "The Groovy Landscape"

This talk is geared to those who are new to Groovy and the goal is to put the Groovy language in is proper context. We will try to answer the following questions:

What are the properties of the language? When and why was it developed? Who is using it and who maintains it? Where can I use it? How do I get started or contribute to development?

2nd Talk - "Grails Security"

Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.

Speaker: David James - David is a software developer and consultant who helps enterprise clients deliver software that makes a business impact. He has been developing applications on the JVM for fifteen years and leverages Groovy on a daily basis. David is involved in the Arlington coworking community and is the founder of the DC Groovy user group.

Cyrus Malekpour - Cyrus (@cmalekpour) is a software developer at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development. Most of his passion is in designing and developing secure applications, but he also has an interest in breaking into things. In his free time, he likes to read, watch movies, and cycle.




<paypal>Washington DC</paypal>



September Meeting:


Facility Sponsor: UberOffices      Refreshment Sponsor: Still Open!