This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Boston"
(→Next Meeting) |
(→Next Meeting) |
||
Line 20: | Line 20: | ||
== Next Meeting == | == Next Meeting == | ||
− | |||
− | NO MEETING IN | + | NO MEETING IN DECEMBER - pneumonia felled our speaker! |
+ | Jan. 4, 2007 | ||
Tool Talk - TBD | Tool Talk - TBD | ||
Line 30: | Line 30: | ||
− | Main Topic: | + | Main Topic: "Tips from the Trenches: working with cryptography and key management in applications" |
+ | Speaker: Dave Low, Sr. Engineer, RSA | ||
+ | |||
+ | Can't afford large consulting fees to help with your crypto related problems or questions? This meeting could be the answer! Dave Low, Sr. engineer from RSA will share his experiences working with customers (who will remain nameless), talking about successes and not so successes, good practices and not so good practices. This is not crypto 101 or 300; but practical advice and anecdotes. Dave will briefly cover the basics of whatever crypto technology is involved in each example so everyone can understand the example. | ||
+ | |||
+ | I'll also be prepared to talk about my experiences writing an enterprise encryption standard and guidance | ||
+ | document, retrofitting encryption to existing data and web applications and other enterprise web application data encryption | ||
+ | topics. | ||
''' | ''' |
Revision as of 02:59, 30 November 2006
Welcome to the OWASP Boston Chapter
To find out more about the Boston chapter, please send an email to Jim Weiler or just join the OWASP Boston mailing list.
We meet the FIRST WEDNESDAY of EVERY MONTH, 6:30 to 9 pm.
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the OWASP Boston mailing list. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.
Information and an RSS feed for meeting updates about this and other Boston area user groups can be found at Boston User Groups.
Location
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month, 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA.
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C.
Reviews
Next Meeting
NO MEETING IN DECEMBER - pneumonia felled our speaker!
Jan. 4, 2007
Tool Talk - TBD
Speaker - Jim Weiler
Main Topic: "Tips from the Trenches: working with cryptography and key management in applications"
Speaker: Dave Low, Sr. Engineer, RSA
Can't afford large consulting fees to help with your crypto related problems or questions? This meeting could be the answer! Dave Low, Sr. engineer from RSA will share his experiences working with customers (who will remain nameless), talking about successes and not so successes, good practices and not so good practices. This is not crypto 101 or 300; but practical advice and anecdotes. Dave will briefly cover the basics of whatever crypto technology is involved in each example so everyone can understand the example.
I'll also be prepared to talk about my experiences writing an enterprise encryption standard and guidance document, retrofitting encryption to existing data and web applications and other enterprise web application data encryption topics.
Past Meeting Notes
Feb 2005
Application Security Inc. PowerPoint slides for the Anatomy of a Database Attack.
March 2005
Joe Stagner: Microsoft Let's talk about Application Security
April 2005
Jonathan Levin - Of Random Numbers
Jothy Rosenberg, Founder and CTO: Service Integrity - Web Services Security
May 2005
Patrick Hynds, CTO: Critical Sites - Passwords - Keys to the Kingdom
June 2005
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security Overview of Application Security Tools
July 2005
Mark O'Neill, CTO: Vordel - Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security
September 2005
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security
October 2005
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - Identity Federation : Prospects and Challenges
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways
November 2005
Robert Hurlbut, Independent Consultant Threat Modeling for web applications
December 2005
Paul Galwas, Product Manager: nCipher Enigma variations: Key Management controlled
January 2006
David Low, Senior Field Engineer: RSA Practical Encryption
February 2006
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source
March 2006
Mateo Meucci; OWASP Italy Anatomy of 2 web attacks
Tom Stracener; Cenzic Web Application Vulnerabilities
April 2006
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints!
May 2006
June 2006
Imperva - Application and Database Vulnerabilities and Intrusion Prevention
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool