This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Meeting Dates & Location)
(Meeting Dates & Location)
Line 34: Line 34:
  
 
<b>Duration: 1 hour 30 minutes</b>
 
<b>Duration: 1 hour 30 minutes</b>
 +
Intended audience: Technical, Technical Management
  
 
<b>Presentation: Making Source Code Analysis Part of the Security Review Process</b>, by Matt Rose, Fortify Software.
 
<b>Presentation: Making Source Code Analysis Part of the Security Review Process</b>, by Matt Rose, Fortify Software.

Revision as of 18:01, 30 October 2006

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leader is Ralf Durkee

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

To join the chapter mailing list, please visit our mailing list homepage. The list is used to discuss the meetings and to arrange meeting locations. You can also review the email archives to see what folks have been talking about. Please check the mailing list before coming to a meeting to confirm the location and time and to catch any last minute notes.


Local Officers

    • President: Ralf Durkee
    • Vice President: Chris Karr
    • Secretary and Treasurer: Steve Buck
    • Web and Communications: Michael Starks

Meeting Dates & Location

Dates: The third Monday of every month, starting at 6:00 PM.

Location: 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) Google Map

Meeting space is graciously offered by Bryant & Stratton College Enter the Frontier Commons plaza, near the Post Office. Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant & Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.

For this meeting, we'll be gathering in room 204. Enter the the main Bryant & Stratton entrance door, go up the stairs and turn left down the hallway to room 204. There will also be a signs on the doors.

November Meeting Details

Date: Monday, November 20, 2006, 6:00 PM

Duration: 1 hour 30 minutes Intended audience: Technical, Technical Management

Presentation: Making Source Code Analysis Part of the Security Review Process, by Matt Rose, Fortify Software.

How do you know if your software applications are secure? Manual audits only cover a small percentage of the source code base and periodic checks only provide a snapshot in time. Source code analysis allows development organizations to manage software security by leveraging well-documented best practices that can be automated. This session will reveal how source code analysis can be a powerful tool for software security architects, developers and QA professionals by pinpointing security vulnerabilities throughout an entire code base as an integral part of the development cycle, or as part of software security audits in order to significantly improve application security. The session will describe the in's and out's of the technology, including its limitations and newly explored areas. Real life examples from actual engagements will be used throughout.

Past Presentations

October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint