This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Belgium"

From OWASP
Jump to: navigation, search
m
(Local News)
 
(293 intermediate revisions by 7 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:[email protected] Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}}  
+
{{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:[email protected] Sebastien Deleersnyder], [mailto:[email protected] Lieven Desmet] and [mailto:[email protected] Bart De Win]
 +
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}}  
  
==== Local News ====
+
= Local News =
  
The '''next chapter meeting''' will be in Brussels in September 2011 prior or just after BruCON.
+
== Upcoming Chapter Meetings ==
  
Block your agenda's for [[BeNeLux OWASP Day 2011]], dates are fixed: '''1-2 December 2011''' and venue reserved: '''University of Luxembourg'''. More details to follow.
+
* OWASP BE chapter meeting: registration via https://owasp-belgium-2019-11-25.eventbrite.com/
  
 +
See the {{#switchtablink:Chapter Meetings|Chapter Meetings}} tab for more details and older meetings.
  
[http://www.brucon.org https://www.owasp.org/images/9/93/Brucon-2011-SMALL.jpg]
+
== Stay in Touch ==
  
OWASP Belgium supports the yearly '''[http://www.brucon.org BruCON conference]''', providing two days of an exciting atmosphere for open discussions of critical information security issues, privacy, information technology and its cultural/technical implications on our society.<br>
+
<center>
BruCON is also:
+
{| cellspacing="15"
* 17 great talks by world class speakers
+
|-
* 11 marvelous workshops
+
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]]  
* The Hex Factor hacking Challenge
+
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]]
* Live Security Podcaster Meetup
+
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]
* Lightning Talks
+
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]
* PowerPoint Karaoke
+
|}
* A fantastic BruCON Party
+
</center>
* The best beers in the world and a wonderful crowd
+
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].
Venue: VUB, Brussels<br>
 
Date:19-20 September<br>
 
If you are an [[Membership|OWASP member]] you can use our BruCON conference discount code to get a 10% discount! Contact seba <at> owasp.org to get the discount code.
 
  
One BruCON training (21-22 September) is given by OWASP project leader '''Pravir Chandra: Threat Modeling and Architecture review'''. Worth-wile to [http://2011.brucon.org/index.php/Training#Threat_Modeling_and_Architecture_review_by_Pravir_Chandra check out]!
+
== Structural Sponsors 2019 ==
  
== Structural Sponsors 2011  ==
+
OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018:  
OWASP Member affiliated to the Belgium chapter:
 
  
{{MemberLinks|link=http://www.ascure.com|logo=Ascure_Logo.jpg}}
+
<!-- Gold -->
 +
[[File:Vest.jpg|250px|link=http://www.vest.nl]]
 +
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]
  
OWASP Belgium thanks its structural chapter supporters for 2011 and the OWASP BeNeLux Day 2011:  
+
<!-- Silver -->
 +
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]]
 +
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]]
 +
&nbsp;[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]
  
[http://www.zionsecurity.com http://www.owasp.org/images/e/e6/Zionsecurity.jpg]
+
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]
[http://www.zenitelbelgium.com http://www.owasp.org/images/d/df/SAIT_Zenitel.jpg]
 
  
If you want to support our chapter, please contact [mailto:[email protected] Seba Deleersnyder]
+
= Chapter Meetings =
  
<paypal>Belgium</paypal>
+
{{:Belgium_Events_2019}}
  
==== Chapter Meetings  ====
+
== Previous Years ==
  
== Next Meeting (16th of June 2011) in Brussels ==
+
Events held in
 +
[[Belgium Events 2018|2018]],
 +
[[Belgium Events 2017|2017]],
 +
[[Belgium Events 2016|2016]],
 +
[[Belgium Events 2015|2015]],
 +
[[Belgium Events 2014|2014]],
 +
[[Belgium Events 2013|2013]],
 +
[[Belgium Events 2012|2012]],
 +
[[Belgium Events 2011|2011]],
 +
[[Belgium Events 2010|2010]],
 +
[[Belgium Events 2009|2009]],
 +
[[Belgium Events 2008|2008]],
 +
[[Belgium Events 2007|2007]],
 +
[[Belgium Events 2006|2006]],
 +
[[Belgium Events 2005|2005]].
  
=== WHEN ===
+
= Belgium OWASP Chapter Leaders =
  
16th of June 2011 18h-21h00
+
The Belgium Chapter is supported by the following board:
  
=== WHERE  ===
+
Chapter Leaders
 +
*Sebastien Deleersnyder, Toreon
 +
*Lieven Desmet, KU Leuven
 +
*Bart De Win, PWC
  
[http://www.deloitte.com/view/en_BE/be/index.htm Deloitte] sponsors the location:<br>
+
Board Members
Berkenlaan 8, 1831 diegem<br>
+
*Erwin Geirnaert, Zion Security
Google Maps [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=Berkenlaan+8a,+8b,+8c+DIEGEM+1831++belgium&sll=50.884738,4.444233&sspn=0.008163,0.022724&ie=UTF8&hq=&hnear=Berkenlaan,+Diegem+1831+Machelen,+Vlaams+Brabant,+Vlaams+Gewest,+Belgium&ll=50.884856,4.444356&spn=0.008163,0.022724&z=16 link]
+
*David Mathy, Freelance
 +
*Adolfo Solero, Freelance
 +
*Stella Dineva, Ingenico Payment Services
 +
*Thomas Herlea, NVISO
  
There will be access to the parking at building 7. The gate between building 7 and 8 will be open.
+
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.  
 
+
__NOTOC__ <headertabs></headertabs>
This gate will provide you access to building 8B, but the meeting room is at building 8C, you are asked to go directly to building 8C
 
 
 
=== PROGRAM ===
 
 
 
The agenda:
 
 
 
*18h00 - 18h30: Welcome &amp; Sandwiches<br>
 
*18h30 - 18h45: '''OWASP Update''' (by Sebastien Deleersnyder, SAIT Zenitel, OWASP Board)<br>
 
*18h45 - 19h45: '''The [[OWASP AppSensor Project]]''' (by Colin Watson, Watson Hall Ltd)<br>
 
:The [[OWASP AppSensor Project]] defines a conceptual framework and methodology that offers prescriptive guidance to implement attack detection and automated response into an existing application.  The talk will provide an overview why conventional defences do not work, and how application-specific detection can be used to identify, and respond to, attackers before they are able to find a flaw to exploit. Implementations will be described that have been tested against security scanning tools, manual attackers and how the technique could be used to defend against an application worm.
 
:'''[[:User:Clerkendweller|Colin Watson]]''' is co-founder of [https://www.watsonhall.com/ Watson Hall Ltd], based in London, where his work involves the management of application risk, designing defensive measures, building security & privacy in to systems development and keeping abreast of relevant international legislation and standards.  He holds a BSc in Chemical Engineering from Heriot-Watt University in Edinburgh, and an MSc in Computation from the University of Oxford.  He contributes to a number of OWASP projects and is a member of the OWASP Global Industry Committee.
 
*19h45 - 20h00: Break<br>
 
*20h00 - 21h00: '''How to become Twitter's admin: An introduction to Modern Web Service Attacks''' (by Andreas Falkenberg, RUB)<br>
 
:Web Services are the cornerstone of inter-application communication in today's IT infrastructure. They are used in distributed systems ranging from huge B2B applications to Cloud APIs (e.g. Amazon EC2). Despite their wide usage, even in critical infrastructures, Web Service security is not fully understood yet. In addition to "classic" web application attacks, such as SQLi and XSS, the use of Web Services opens a whole new realm of attack vectors not found anywhere else.
 
:This talk will give an introduction to current attack techniques for Web Services that have been found in today's Web Services implementation stacks. As a hands on example, the attack technique of the "XML Signature Wrapping" attack is explained in detail. This attack enables an attacker to arbitrarily modify the content of a signed SOAP message with almost no effort.
 
:Based on the XML Signature Wrapping attack, an attack scenario is shown that enables an attacker to become admin of the famous Twitter service, based on a real-life XML Signature Wrapping Attack performed by researchers at our university in 2010.
 
:The last part of the talk gives an overview of other Web Service specific attacks and countermeasures, based on the information given at the WS-Attacks.org website.
 
:'''Andreas''' is currently seeking a Master's degree in IT Security at the Ruhr University of Bochum, Germany. Besides being busy writing exams, Andreas works for the Chair for Network- and Data-Security having fun with Cloud- and Web Service-Security.
 
 
 
=== REGISTRATION  ===
 
 
 
Please register via RegOnline: https://www.regonline.com/owasp-belgium-2011-06-16
 
 
 
== Previous Meeting (23th of May 2011) in Brussels ==
 
 
 
Read @xme's review of the meeting on [http://blog.rootshell.be/2011/05/23/may-2011-owasp-belgium-meeting-wrap-up/ /dev/random blog]
 
 
 
=== WHEN ===
 
 
 
23th of May2011 18h-21h00
 
 
 
=== WHERE  ===
 
 
 
LCM, Haachtsesteenweg 579 1031 Brussel
 
 
 
=== PROGRAM ===
 
 
 
The agenda:
 
 
 
*18h00 - 18h30: Welcome &amp; Sandwiches<br>
 
*18h30 - 18h45: '''OWASP Update''' (by Sebastien Deleersnyder, SAIT Zenitel, OWASP Board)<br>
 
*18h45 - 19h00: '''ISSA Update''' (by Clement Herssens)<br>
 
*19h00 - 19h45: '''[https://www.owasp.org/images/7/72/Non-convential_Attacks_Things_your_security_scanners_wont_find.pdf Non-convential Attacks: Things your security scanners won't find]''' (by Tom Van Der Mussele, Verizon)<br>
 
:This presentation will handle non-conventional attacks, such as:
 
:* Attacking XML Streams
 
:* Context escaping
 
:* Session Time-outs
 
:'''Tom Van der Mussele''' is a Lead Security Analyst for the Governance, Risk & Compliance Programs in EMEA for Verizon Business Security Solutions. Prior to joining the Governance, Risk & Compliance Programs, Tom worked as Penetration tester. In this role, he specialized in security audits, including penetration testing and web application vulnerability assessments for major financials and governmental organizations.
 
*19h45 - 20h30: '''[https://www.owasp.org/images/f/f4/Future_of_XSS_v4.pptx The Ghost of XSS Past, Present and Future – A Defensive Tale]''' (by Jim Manico, Infrared Security)<br>
 
:This talk will discuss the past methods used for XSS defense that were only partially effective. Learning from these lessons, will will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer. We will then finish with a discussion of future XSS defense mythologies that shift the burden of XSS defense from the developer to various frameworks. These include auto-escaping template technologies, browser-based defenses such as Content Security Policy, and Javascript sandboxes such as the Google CAJA project and JSReg.
 
:'''[[:User:Jmanico|Jim Manico]]''' is a managing partner of Infrared Security with over 15 years of professional web development experience. Jim is also the chair of the OWASP connections committee, one of the project managers of the OWASP ESAPI project, a participant and manager of the OWASP Cheatsheet series, the producer and host of the OWASP Podcast Series, the manager of the OWASP Java HTML Sanitizer project and the manager of the OWASP Java Encoder project. When not OWASP'ing, Jim lives on of island of Kauai with his lovely wife Tracey.
 
*20h30 - 21h00: '''Discussion: How CERT.be & OWASP can improve web application security in Belgium''' (by Christian Van Heurck, CERT.be)<br>
 
:CERT.be presentation and group discussion
 
 
 
 
 
== Previous Meeting (March 1st 2011) in Leuven ==
 
 
 
=== WHEN ===
 
 
 
March 1st 2011 18h-21h30
 
 
 
=== WHERE  ===
 
 
 
Hosted by [http://distrinet.cs.kuleuven.be Distrinet Research Group (K.U.Leuven)].
 
 
 
 
 
Address: <br> Department of Computer Science (auditorium 00.225)<br> Celestijnenlaan 200 A<br> 3001 Heverlee <br>
 
 
 
Routemap: http://distrinet.cs.kuleuven.be/about/route/
 
 
 
=== PROGRAM ===
 
 
 
The agenda:
 
 
 
*18h00 - 18h30: Welcome &amp; Sandwiches<br>
 
*18h30 - 18h45: '''OWASP Update''' (by Sebastien Deleersnyder, SAIT Zenitel, OWASP Board)<br>
 
*18h45 - 19h45: '''The Thinking Person's Guide to the Cloud. HOWTO: Keep your head in the clouds and your feet on the ground''' (by Gunnar Peterson, Arctec Group)<br>
 
:“Everything we think of as a computer today is really just a device that connects to the big computer that we are all collectively building"-Tim O'Reilly
 
:My friend Chris Hoff asked this question in a recent podcast - "why is the OWASP Top Ten the same year after year? why don't these things gets fixed?"[1]. The reason is that software security and security architecture and design is nowhere near as a high priority as it needs to be.
 
:If you look at the evolution of software over the years, you will see a history of more and more systems and data being connected together. Beginning with the Web through to component based application and then to Web services, at each step the common theme is more connectivity, more integration. Software is a rapidly changing universe
 
:Unfortunately, Information Security has not kept up. Our field started out promisingly in the mid-90s with network firewalls and SSL for security mechanisms to defend websites, but that is about as far it got. In 1999 when SOAP emerged as a firewall-friendly protocol designed for the explicit reason to go through the firewall, that should have been a wake up call to Information Security that the "firewall + SSL" security architecture was past its prime, but here 10 years later we are still hitting the snooze button.
 
:My view is that as technology is deployed we need security mechanisms that form fit to those new technologies, instead what we have is security technologies that form fit to auditor's excel spreadsheets.
 
:[http://1raindrop.typepad.com/ Gunnar Peterson] is a Managing Principal at Arctec Group. He is focused  on distributed systems security for large mission critical financial, financial exchanges, healthcare, manufacturer, and insurance systems, as well as emerging start ups. Mr. Peterson is an internationally  recognized software security expert, frequently published, an Associate Editor for IEEE Security & Privacy Journal on Building Security In, a contributor to the SEI and DHS Build  Security In portal on software security, a Visiting Scientist at Carnegie Mellon Software Engineering Institute, and an in-demand speaker at security conferences. He maintains a popular informationsecurity blog at [http://1raindrop.typepad.com http://1raindrop.typepad.com].
 
*19h45 - 20h00: Break<br>
 
*20h00 - 21h30: '''Threat modeling''' (by John Steven, Cigital)<br>
 
:How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management. Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.
 
:[http://www.owasp.org/index.php/User:John_Steven John Steven] is Senior Director of Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted adviser to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security & Privacy magazine and speaks with regularity at conferences and trade shows. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.
 
:John leads the Virginia OWASP Northern Virginia (NoVA) chapter.
 
 
 
 
 
 
 
 
== Past Events  ==
 
*Events held in [[Belgium Previous Events 2010|2010]]
 
*Events held in [[Belgium Previous Events 2009|2009]]
 
*Events held in [[Belgium Previous Events 2008|2008]]
 
*Events held in [[Belgium Previous Events 2007|2007]]
 
*Events held in [[Belgium Previous Events 2006|2006]]
 
*Events held in [[Belgium Previous Events 2005|2005]]
 
 
 
==== Belgium OWASP Chapter Leaders  ====
 
 
 
The BeLux Chapter is supported by the following board:
 
 
 
*Erwin Geirnaert, Zion Security
 
*Philippe Bogaerts, F5
 
*André Mariën, Inno.com
 
*Lieven Desmet, K.U.Leuven
 
*Joël Quinet, Telindus
 
*Sebastien Deleersnyder, Zenitel
 
*Bart De Win, Ascure
 
 
 
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. __NOTOC__ <headertabs />
 
 
[[Category:Europe]]
 
[[Category:Europe]]

Latest revision as of 18:57, 13 November 2019

OWASP Belgium

Welcome to the Belgium chapter homepage. The chapter leaders are Sebastien Deleersnyder, Lieven Desmet and Bart De Win


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Upcoming Chapter Meetings

See the Chapter Meetings tab for more details and older meetings.

Stay in Touch

Meetup-logo-2x.png Join the list.png Follow-us-on-twitter.png Linkedin-button.gif

If you want to be invited for the next OWASP Belgium Chapter meetings, please drop us your contact info.

Structural Sponsors 2019

OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018:

Vest.jpg DavinsiLabs.png

LogoToreon.jpg Nviso logo RGB baseline 200px.png  LogoIngenicoGroup.png

If you want to support our chapter, please contact Seba Deleersnyder

25 November 2019 Meeting

Where

  • Address:
Park Inn by Radisson Leuven
Martelarenlaan 36
3010  Leuven

Agenda

Program

Recent evolutions in the OAuth 2.0 and OpenID Connect landscape

Abstract

Ever since the introduction of OAuth 2.0, the framework has been in continuous evolution. The initial specification addressed a strong need for delegation. However, since then, various addendums focus on the needs of modern applications. Today, the suite of OAuth 2.0 specifications supports a broad spectrum of different scenarios. For each of these scenarios makes their security assumptions and defines a set of best practices.

In this talk, we will investigate a number of these recent additions. We look at the recently added “Proof of Key for Code Exchange” (PKCE) flow. We also investigate how it is becoming the default flow for Single Page Applications. We also extensively dive into “Proof of Possession” tokens. Their security properties are significantly better than bearer tokens. Consequentially, everyone should know what they entail, and how to use them. You will walk away with a solid overview of recent evolutions in OAuth 2.0, and where to use them in your applications.

Speaker Bio

Philippe De Ryck helps developers protect companies through better web security. As the founder of Pragmatic Web Security, he travels the world to train developers on web security and security engineering. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. Google recognizes Philippe as a Google Developer Expert for his work on security in Angular applications.

Detection and Prevention of DNS abuse in .eu TLD

Abstract

This session reports on an extensive analysis of 14 months of domain registration in the .eu TLD. In particular, we investigate domain names that are registered for malicious purposes (such as spam, phishing, botnets C&C, ...). The goal of our research is to understand and identify large-scale malicious campaigns, and to early detect and prevent malicious registrations.

We explore the ecosystem and modus operandi of elaborate cyber criminal entities that recurrently register large amounts of domains for one-shot, malicious use. We further report on insights in the operational aspects of this business and observe, for instance, that their processes are only partially automated.

Finally, we present our automatic prediction system, that classifies at registration time whether a domain name will be used maliciously or benign. As such, malicious domain registrations can effectively be prevented from doing any harm. As part of the talk, we discuss the first results of this prediction system, which currently runs in production at EURid, the registry of the .eu TLD.

Speaker Bio

Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in web and infrastructure security, and participates in dissemination, valorisation and spin-off activities.

Registration

Registration is via EventBrite: https://owasp-belgium-2019-11-25.eventbrite.com.

Coverage

n/a

summit working session on OWASP SAMM

OWASP Belgium presents a summit working session on OWASP SAMM in Antwerp on 30 April:

Registration via https://www.eventbrite.com/e/open-security-summit-working-session-tickets-60456102831

20 February 2019 Meeting

Where

Department of Computer Science (foyer at ground floor)
Celestijnenlaan 200 A
3001 Heverlee

Agenda

  • 18h15 - 19h00: Welcome & sandwiches
  • 19h00 - 19h10: OWASP Update by Sebastien Deleersnyder (OWASP)
  • 19h10 - 20h00: ''CSP in the age of Script Gadgets by Prof. Martin Johns (TU Braunschweig)
  • 20h00 - 20h10: Break
  • 20h10 - 21h00: Zero to DevSecOps - security in a DevOps world (part 1, 2, 3) by Jimmy Mesta (CTO, Manicode Security)

Program

CSP in the age of Script Gadgets

  • Speaker: Prof. Martin Johns (TU Braunschweig)
  • Presentation: not yet available

Abstract

Content Security Policy (CSP) was first introduced in 2012. It should have been a silver-bullet defense against various injection attacks, including the rampant Cross-Site Scripting vulnerabilities. Unfortunately, modern development practices and legacy code bases proved to be substantial obstacles. New versions of CSP were released to address usability and compatibility for developers. Unfortunately, researchers discovered many bypasses and vulnerabilities in real-world CSP policies. The latest problem is known as script gadgets, where data is turned into code by legitimate functionality.

In this session, we will take a look at the problems you might encounter when deploying CSP. We start at CSP level 1 and work towards the latest level 3 version. We discuss CSP's features, potential bypasses, and pitfalls to avoid. In the end, you will have gained the knowledge to deploy a secure and effective CSP policy.

Speaker Bio

Martin Johns is a full professor at the TU Braunschweig.

Zero to DevSecOps - security in a DevOps world

  • Speaker: Jimmy Mesta (CTO, Manicode Security)
  • Presentation: not yet available

Abstract

The way that software is being deployed is undergoing a massive transformation. As a result, security teams are at a point where they must adapt or be left in the dust. Traditional application security used to be heavyweight and human-driven. Tasks are more often than not mostly manual efforts. Time-consuming security testing often breaks down in an automated world. Dynamic vulnerability scanning and manual code reviews are incompatible with a world where code changes are automatically being pushed to production hundreds of times per day.

This talk will share lessons learned from helping teams of all sizes and maturity levels with their transformation to a DevSecOps model where security goes from being a blocker to an enabler. Specifically, we will cover some of the tools and processes you can start using right now. These tools allow you to start adding real value to your organization through enhanced visibility, vulnerability discovery, and feedback loops. It is time to adapt and embrace a new era of security.

Speaker Bio

Jimmy Mesta is CTO at Manicode Security. He is a DevSecOps, Mobile, and Kubernetes Secure Coding Instructor.

Registration

Registration is via EventBrite: https://owasp-belgium-2019-02-20.eventbrite.com.

Coverage

n/a

Previous Years

Events held in 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005.

The Belgium Chapter is supported by the following board:

Chapter Leaders

  • Sebastien Deleersnyder, Toreon
  • Lieven Desmet, KU Leuven
  • Bart De Win, PWC

Board Members

  • Erwin Geirnaert, Zion Security
  • David Mathy, Freelance
  • Adolfo Solero, Freelance
  • Stella Dineva, Ingenico Payment Services
  • Thomas Herlea, NVISO

Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.