This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Washington DC"

From OWASP
Jump to: navigation, search
Line 16: Line 16:
 
'''Next Meeting'''
 
'''Next Meeting'''
  
The next meeting will be on March 15th at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.<br>
+
The next meeting will be on May 16, 2012 at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.
 +
<br>
 +
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 +
<br>
 +
'''Speaker''': Rohit Sethi, Vice President, Product Development, SD Elements
 +
<br>
 +
'''Topic''': Is There An End to Testing Ourselves Secure?
 +
<br>
 +
'''Abstract''': Despite years of research on best practices to integrate security into the early phases of the SDLC, most organizations rely on static analysis, dynamic analysis, and penetration testing as their primary means of eliminating vulnerabilities. This approach leads to discovering vulnerabilities late in the development process,  thereby either causing project delays or risk acceptance.
 +
<br>
 +
This talk is an open discussion about the presence, if any, of scalable, measureable, approaches working to address security into the SDLC.  Consideration for how Agile development impacts effectiveness will be explored.
 +
<br>
 +
Points of discussion include:
  
Please RSVP for the event here: http://owaspdc.eventbrite.com/
+
·        Is static analysis sufficient?
  
'''Speaker''': Alissa Torres
+
·        Developer awareness training
  
'''Topic''': Application Footprinting
+
·        Threat modeling / architecture analysis
 
 
'''Abstract''': Application footprinting is a great skill for forensic examiners (and anyone interested in binary research) because it allows you to marry artifacts in the registry/file creation/time/date stamps with specific applications or user initiated events.  Eventually, during the course of an investigation, an examiner is going to run into a "new" problem - one that hasn't previously been experienced/researched by others in the field.  Application footprinting is a simple method that examines the interaction of a program with the operating system.  The process of footprinting will determine if the application was installed on the system being investigated, what trace evidence exists and how that can be mined.  This presentation will include a demo of Active Registry Monitor and its use in tracking changes made to the Windows Registry by an open source ssh client.
 
  
'''Bio''': Alissa Torres currently works as a security researcher for KEYW Corporation in Maryland and has 10 years technical expertise in the information technology field. Previously, she was a digital forensic investigator on a government contractor security team. She has extensive experience in information security, spanning government, academic and corporate environments and holds a Bachelor’s degree from University of Virginia and a Master’s from University of Maryland in Information Technology. Alissa taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), teaching incident response and network basics to security professionals entering the forensics community. In addition, she has presented at various industry conferences and currently holds the following industry certifications: GCFA, CISSP, EnCE.
+
·        Secure requirements
  
 +
·        Considerations for procured applications
 +
<br>
 +
'''Bio''': Rohit Sethi is a specialist in building security controls into the software development life cycle (SDLC). Rohit is a SANS course developer and instructor on Secure J2EE development. He has spoken and taught at FS-ISAC, RSA, OWASP, Shmoocon, CSI National, Sec Tor, Infosecurity New York and Toronto, TASK, the ISC2's Secure Leadership series conferences, and many others. Mr. Sethi has written articles for Dr. Dobb's Journal, TechTarget, Security Focus and the Web Application Security Consortium (WASC), and he has been quoted as an expert in application security for ITWorldCanada and Computer World. He also leads the OWASP Design Patterns Security Analysis project.
  
 
= Participation =
 
= Participation =
Line 47: Line 60:
  
 
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br><br>
 
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br><br>
 +
 +
'''March 2012 Meeting'''
 +
 +
March 15th at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.<br>
 +
 +
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 +
 +
'''Speaker''': Alissa Torres
 +
 +
'''Topic''': Application Footprinting
 +
 +
'''Abstract''': Application footprinting is a great skill for forensic examiners (and anyone interested in binary research) because it allows you to marry artifacts in the registry/file creation/time/date stamps with specific applications or user initiated events.  Eventually, during the course of an investigation, an examiner is going to run into a "new" problem - one that hasn't previously been experienced/researched by others in the field.  Application footprinting is a simple method that examines the interaction of a program with the operating system.  The process of footprinting will determine if the application was installed on the system being investigated, what trace evidence exists and how that can be mined.  This presentation will include a demo of Active Registry Monitor and its use in tracking changes made to the Windows Registry by an open source ssh client.
 +
 +
'''Bio''': Alissa Torres currently works as a security researcher for KEYW Corporation in Maryland and has 10 years technical expertise in the information technology field. Previously, she was a digital forensic investigator on a government contractor security team. She has extensive experience in information security, spanning government, academic and corporate environments and holds a Bachelor’s degree from University of Virginia and a Master’s from University of Maryland in Information Technology. Alissa taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), teaching incident response and network basics to security professionals entering the forensics community. In addition, she has presented at various industry conferences and currently holds the following industry certifications: GCFA, CISSP, EnCE.
 +
 +
  
 
'''December 2011 Meeting'''
 
'''December 2011 Meeting'''
  
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
+
'''The December 21st meeting was held at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
  
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>

Revision as of 10:11, 26 April 2012


Welcome to the Home Page of the Washington DC OWASP Chapter.

  • The chapter Co-Chairs are Trevor Hawthorn, and Rinaldi Rampen. Please contact us with any questions about the chapter.
  • Please subscribe to the mailing list for meeting announcements.
  • You can follow us on Twitter as @OWASPDC
  • Our recent meetings are documented on the News & Meetings tab.
  • You can also check out the archives of this page here Washington_DC Archives.




<paypal>Washington DC</paypal>

September Meeting:

Facility Sponsor: Living Social      Refreshment Sponsor: Still Open!