This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Los Angeles"

From OWASP
Jump to: navigation, search
Line 17: Line 17:
 
== Next&nbsp;Chapter Meeting:&nbsp; Wednesday,&nbsp;March 16, 2011 6:00 P.M.&nbsp;- 8:30 P.M. <br> ==
 
== Next&nbsp;Chapter Meeting:&nbsp; Wednesday,&nbsp;March 16, 2011 6:00 P.M.&nbsp;- 8:30 P.M. <br> ==
  
Les Freres Taix French Restaurant<br>1911 West Sunset Blvd.<br>Los Angeles, CA 90026<br>213/484-1265&nbsp;
+
Les Freres Taix French Restaurant<br>1911 West Sunset Blvd.<br>Los Angeles, CA 90026<br>213/484-1265&nbsp;  
  
 
  Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/
 
  Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/
Line 30: Line 30:
 
== '''Topic: STUXNET'''<br> ==
 
== '''Topic: STUXNET'''<br> ==
  
== '''Speaker: Scott Sutherland'''[[Image:Liam_OMurchu.png|left|112x168px|Scottsutherland.jpeg]]&nbsp; <br> ==
+
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&nbsp; <br> ==
  
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.<br>
+
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran.  
  
 
'''<span style="display: none" id="1298067122121S">&nbsp;</span>'''  
 
'''<span style="display: none" id="1298067122121S">&nbsp;</span>'''  
  
'''<span style="display: none" id="1298067115834S">&nbsp;</span>'''  
+
'''<span style="display: none" id="1298067115834S">&nbsp;</span>''''''<br><br>Abstract: STUXNET'''<br>
  
<br>
+
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran.  
 
 
<br>
 
 
 
<br>
 
 
 
== '''<br><br>Abstract: Database Security in the Real World'''<br> ==
 
 
 
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.<br>
 
  
 
<br>
 
<br>

Revision as of 00:43, 9 March 2011

Local News

Sign up for OWASP Los Angeles mailing list, very low volume and spam free.
https://lists.owasp.org/mailman/listinfo/owasp-losangeles


The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success!

http://2010.AppSecUSA.org

Check out the videos: http://vimeo.com/user4863863/videos

AppSec Logo.jpg

Next Chapter Meeting:  Wednesday, March 16, 2011 6:00 P.M. - 8:30 P.M.

Les Freres Taix French Restaurant
1911 West Sunset Blvd.
Los Angeles, CA 90026
213/484-1265 

Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/
]

<paypal>Los Angeles</paypal>


Topic: STUXNET

Speaker: Liam O Murchu
Scottsutherland.jpeg
 

Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran.

''

Abstract: STUXNET

Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran.


Sponsor:

Netspi logo.png






http://www.netspi.com/



Would you like to speak at an OWASP Los Angeles Meeting?

Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to Tin Zaw. When we accept your talk, it will be required to use the Powerpoint OWASP Template.

Archives of Previous Meetings

A list of previous presentations conducted at the Los Angeles Chapter can be found here.

Los Angeles Chapter