This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Ottawa"

From OWASP
Jump to: navigation, search
(Next Meeting: Tuesday, May 29th, 2007)
(Next Meeting: Thursday, September 6th, 2007)
Line 7: Line 7:
 
'''Meeting Sponsor:  
 
'''Meeting Sponsor:  
 
[http://www.rigelksecurity.com Rigel Kent Security] [http://www.macadamian.com [[Image:mac-logo.gif ]]]'''  
 
[http://www.rigelksecurity.com Rigel Kent Security] [http://www.macadamian.com [[Image:mac-logo.gif ]]]'''  
[http://www.sophos.com [[Image:sophos-logo.gif]]]'''  
+
'''  
  
 
'''Meeting schedule:'''  
 
'''Meeting schedule:'''  
 
       6:00-6:30 Food and drinks
 
       6:00-6:30 Food and drinks
 
       6:30-7:30 Main presentation
 
       6:30-7:30 Main presentation
       7:30-8:00 Open discussion and questions
+
       7:15-8:00 Open discussion and questions
  
'''Speaker: Christian Beauclair  - Microsoft Canada'''
+
'''Speaker: Erik Klein - Fortify Enterprises'''
  
'''Topic : Security Development Lifecycle for IT''' - The impact of phishing and other forms of online identity phraud has grown enormously in the last few years. Today, people are starting to curb their activities online due to fears of phishing and phraud and because they just can’t be bothered to fight through today’s online authentication systems such as multiple usernames and passwords, Captcha control and OTP tokens. In this session we’ll explore some of the core issues facing our identities online and then discuss how technologies such as Windows CardSpace enable users to authenticate and/or present personal information more easily and safely to sites that they know are legitimate.
+
'''Topic : Make My Day - Just Run a Web Scanner:''' Countering the Faults of Typical Web Scanners Through Byte-Code Injection - Bytecode instrumentation allows a user to inject additional code into an application's binary. This technique has traditionally been used to measure the runtime performance and test coverage of Web applications. However, bytecode instrumentation has other promising uses, including software security. As the overall security space evolves from the outside-in approach we saw with Web Application Firewalls in the 1990s, bytecode instrumentation provides the perfect opportunity to embed security into the application itself. This talk will provide an overview of bytecode instrumentation, demonstrate how the technology works, and show some concrete ways it can be used to inject security features into an application after it has been developed

Revision as of 21:12, 16 November 2007

OWASP Ottawa

Welcome to the Ottawa chapter homepage. The chapter leaders are Mike Sues and Sherif Koussa


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Meetings Location

Rigel Kent Security: 180 Preston 3rd floor . Map

Next Meeting: Thursday, September 6th, 2007

Meeting Sponsor: Rigel Kent Security Mac-logo.gif

Meeting schedule:

     6:00-6:30 Food and drinks
     6:30-7:30 Main presentation
     7:15-8:00 Open discussion and questions

Speaker: Erik Klein - Fortify Enterprises

Topic : Make My Day - Just Run a Web Scanner: Countering the Faults of Typical Web Scanners Through Byte-Code Injection - Bytecode instrumentation allows a user to inject additional code into an application's binary. This technique has traditionally been used to measure the runtime performance and test coverage of Web applications. However, bytecode instrumentation has other promising uses, including software security. As the overall security space evolves from the outside-in approach we saw with Web Application Firewalls in the 1990s, bytecode instrumentation provides the perfect opportunity to embed security into the application itself. This talk will provide an overview of bytecode instrumentation, demonstrate how the technology works, and show some concrete ways it can be used to inject security features into an application after it has been developed