This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Columbus"

From OWASP
Jump to: navigation, search
(Local News)
(September 2008 Meeting)
Line 10: Line 10:
 
Thank you!
 
Thank you!
  
== July 2008 Meeting ==
+
== September (Q3) 2008 Meeting ==
  
'''When:''' July 7th, 2008, 11:00 AM - 1:00 PM, Doors open at 10:30 AM; ** Refreshments Provided **
+
'''When:''' September 16th, 2008, 11:00 AM - 1:00 PM, Doors open at 10:30 AM; ** Refreshments Provided **
  
'''Where:''' Heritage Room, One Nationwide Plaza, Columbus, OH 43215
+
'''Where:''' Conference Room G, 215 N. Front St, Columbus, OH 43215 (corner of N. Front and W. Spring). http://maps.google.com/maps?f=q&hl=en&geocode=&q=215+N.+Front+Street,+Columbus,+OH&sll=37.0625,-95.677068&sspn=58.731174,113.203125&ie=UTF8&layer=x&ll=39.96903,-83.005207&spn=0.007038,0.013819&z=16
  
'''Parking:''' Recommend parking the Front St. Garage; take Skywalk from the garage over to the Nationwide Plazas. Signs will be posted.
+
'''RSVP:''' Send email to [email protected]. This is highly recommended for security and logistical purposes. Those that RSVP will receive a calendar/meeting invite from owaspcmh@gmail.com.
  
'''General Session Topic: A2 - Injection Flaws - SQL Injection'''
+
'''Parking:''' Recommend parking at the Front St. Garage; (about 120 yards from 215 N. Front St.) Signs will be posted at 215 N. Front St.
  
'''Who:''' Chris Hayes & Greg Green (Nationwide - OWASP Columbus, OH - Chapter Leaders)
+
'''General Session Topic:''' Centralized Security Functionality In a .NET World – The OWASP .NET ESAPI Project
  
Chris and Greg will be collaborating to present an in-depth presentation on SQL injection. Per OWASP: "Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data."
+
'''Who:''' Alex Smolen, Consultant, Foundstone Professional Services
  
The presentation will consist of:
+
The Enterprise Security Application Programming Interface, or ESAPI, is a one-stop security shop for developers looking to implement security mechanisms in their code. The OWASP .NET ESAPI project intends to help .NET developers avoid introducing  security vulnerabilities into their code by providing a full port of the original ESAPI project from Java to C#.
  
  1. A brief overview of injection flaws.
+
This talk will explore the gains, gripes, and gotchas of converting the ESAPI to .NET from the .NET ESAPI project lead himself. It will discuss features of the .NET frameworks security model, key differences between the Java and .NET platforms, and ASP.NET web security issues. Additionally, future ideas for .NET specific functionality will be proposed and discussed. Participation and feedback from the attendees is expected and encouraged.
  2. Different types of SQL injection.
+
 
  3. Common methods / technologies to prevent SQL injection
+
Foundstone® Professional Services, a division of McAfee. Inc.,  offers expert services and education to help organizations continuously and  measurably protect their most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies and implements  the right balance of technology, people, and process to manage digital risk and  leverage security investments more effectively. The company’s professional  services team consists of recognized security experts and authors with broad  security experience with multinational corporations, the public sector, and the  US military.
  4. Examples of input validation at the following tiers (http://en.wikipedia.org/wiki/N-tier):
 
      a. Client side
 
      b. Presentation tier
 
      c. Application tier
 
      d. Data tier
 
  5. Q&A / General Discussion
 
  
 
[[Category:Ohio]]
 
[[Category:Ohio]]

Revision as of 16:34, 6 August 2008

OWASP Columbus, OH

Welcome to the Columbus, OH chapter homepage. The chapter leaders are Chris Hayes and Greg Green.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local News

– REMINDER – Next chapter meeting - 9/16/2008; details to follow

We are still seeking one or two more board members and to get the local community involved by publicizing the chapter. We are currently planning activities for the remainder of 2008; at least one chapter meeting per quarter - more if interest warrants.

To submit educational topics for upcoming meetings, please submit your powerpoint using the OWASP Template and include a speaker BIO. Any inquiries regarding chapter or meeting sponsors can be directed to Chris Hayes. Please begin the subject header with: [OWASP COLUMBUS].

Thank you!

September (Q3) 2008 Meeting

When: September 16th, 2008, 11:00 AM - 1:00 PM, Doors open at 10:30 AM; ** Refreshments Provided **

Where: Conference Room G, 215 N. Front St, Columbus, OH 43215 (corner of N. Front and W. Spring). http://maps.google.com/maps?f=q&hl=en&geocode=&q=215+N.+Front+Street,+Columbus,+OH&sll=37.0625,-95.677068&sspn=58.731174,113.203125&ie=UTF8&layer=x&ll=39.96903,-83.005207&spn=0.007038,0.013819&z=16

RSVP: Send email to [email protected]. This is highly recommended for security and logistical purposes. Those that RSVP will receive a calendar/meeting invite from [email protected].

Parking: Recommend parking at the Front St. Garage; (about 120 yards from 215 N. Front St.) Signs will be posted at 215 N. Front St.

General Session Topic: Centralized Security Functionality In a .NET World – The OWASP .NET ESAPI Project

Who: Alex Smolen, Consultant, Foundstone Professional Services

The Enterprise Security Application Programming Interface, or ESAPI, is a one-stop security shop for developers looking to implement security mechanisms in their code. The OWASP .NET ESAPI project intends to help .NET developers avoid introducing security vulnerabilities into their code by providing a full port of the original ESAPI project from Java to C#.

This talk will explore the gains, gripes, and gotchas of converting the ESAPI to .NET from the .NET ESAPI project lead himself. It will discuss features of the .NET frameworks security model, key differences between the Java and .NET platforms, and ASP.NET web security issues. Additionally, future ideas for .NET specific functionality will be proposed and discussed. Participation and feedback from the attendees is expected and encouraged.

Foundstone® Professional Services, a division of McAfee. Inc., offers expert services and education to help organizations continuously and measurably protect their most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies and implements the right balance of technology, people, and process to manage digital risk and leverage security investments more effectively. The company’s professional services team consists of recognized security experts and authors with broad security experience with multinational corporations, the public sector, and the US military.