This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Austin"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}}  
+
{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Paul Griffith, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}}  
 
<br><br>
 
<br><br>
  
Line 7: Line 7:
  
  
== August OWASP Austin Chapter Meeting - Vulnerability Spidey Sense (Sponsored by SolarWinds) ==
+
== January OWASP Austin Chapter Meeting ==
  
  
'''When:''' September 25th from 11:30a - 1:00p
+
'''When:''' January 29th from 11:30a - 1:00p
  
'''Who:''' Daniel Crowely and Chris VineCombe
+
'''Who:''' Wendy Nather
  
  
Daniel Crowley - Daniel (aka "unicornFurnace") is an Application Security Consultant for Trustwave's SpiderLabs team. He has been working in the information security industry for over 7 years and has been focused on penetration testing, specifically on Web applications. Daniel denies all allegations regarding unicorn smuggling and questions your character for even
 
suggesting it. Daniel has developed configurable testbeds such as SQLol and XMLmao for training and research regarding specific vulnerabilities. Daniel enjoys climbing large rocks. Daniel is a frequent speaker at conferences including DEFCON, Shmoocon, and SOURCE. Daniel does his own charcuterie.
 
  
Chris Vinecombe - Chris Vinecombe is an Application Security Analyst for Trustwave's SpiderLabs team.  He has been working in the information security industry for 2 years.  He currently focuses on penetration testing, specifically web application security.  He is eager to learn ALL the things.
+
'''Topic:''' Data events, or why security is cloudier than you think.
  
 +
'''Abstract:''' Data security doesn't involve just securing data at rest or in transit.
 +
It
 +
also needs to be secured in use ­ which means that at any point, the
 +
characteristics of the data can change. We call this situation a "data
 +
event," and it can mean that security requirements have to change as a
 +
result.
  
'''Topic:''' Vulnerability Spidey Sense
+
This is not the same thing as logging event data; this is taking into
 +
account changes in the combination, use or business context surrounding
 +
specific data. For example, a press release is confidential and
 +
requires a
 +
certain set of security policies in the areas of access control, DLP,
 +
key
 +
management (if encryption is involved), and so on. But once the business
 +
event occurs, the press release suddenly becomes the opposite of
 +
confidential, and all the policies have to change immediately as a
 +
result.
  
'''Abstract:''' A dedicated attacker does not have time limitations when attempting to find vulnerabilities in a target. As a penetration tester, you are bound by certain restrictions, including scope, attack methods, and time/date restrictions. Because of these restrictions, it's helpful to prioritize certain targets over others to increase your chances of breaking in. This talk will cover scenarios which raise red flags for us, why, and how to develop your own sense of intuition.
+
Data events can also occur when data elements are combined in particular
 +
ways so that they become covered by regulations. A query might produce a
 +
small enough sample size that it needs to be treated as protected
 +
information, or a doctor becomes a patient so that her name is now
 +
protected by HIPAA. Data events are often tied closely to the business
 +
context, and as such can mirror transactions and workflows.
  
 +
Data events are important because traditional security policies have
 +
been
 +
applied to the current container of the data: this database is
 +
confidential because some rows are confidential, or this Word document
 +
requires access control (but its content can be copied and pasted
 +
somewhere else). Container-centric security is too static for today's
 +
high-speed, big-data, cloud-based (pick as many buzzwords as you like)
 +
processing.
  
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all! Only those who RSVP will be eligible for any drawings/giveaways that may take place!
+
This talk will describe the concept of data events, and will invite
 +
audience discussion on how security controls can be adapted to them.
  
  
'''Sponsor:''' Solarwinds
+
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all! Only those who RSVP will be eligible for any drawings/giveaways that may take place!
 
 
'''Sponsor Information:'''
 
 
 
Since our founding in 1999, SolarWinds’ (NYSE: SWI) mission has been to provide purpose-built products that are designed to make IT professionals’ jobs easier. We offer value-driven products and tools that solve a broad range of IT management challenges – whether those challenges are related to networks, servers, applications, storage or virtualization.
 
 
At SolarWinds, we are fanatical about putting our users first in everything we do. We strive every day to deliver powerful functionality that is easy to use with one of the fastest and longest lasting ROIs in the market.  Our approach is to deliver "unexpected simplicity" and redefine the expectations IT Pros have for enterprise software.
 
 
 
 
 
Products related to application security:
 
  
Patch Manager
 
Log & Event Manager
 
Firewall Security Manager
 
Network Configuration Manager
 
  
 
'''Location:''' National Instruments, 11500 N. Mopac.Building C
 
'''Location:''' National Instruments, 11500 N. Mopac.Building C
  
'''RSVP:''' http://www.eventbrite.com/event/4319523812
+
'''RSVP:''' Posting soon.  
  
  
Line 70: Line 84:
  
 
== Future Speakers and Events  ==
 
== Future Speakers and Events  ==
 
+
*January 29th, 2013 -11:30 AM to 1 PM, Austin OWASP Meeting, Data events, or why security is cloudier than you think - Wendy Nather, 451 Group
  
  
Line 79: Line 93:
  
 
=Record Hall of Meetings=
 
=Record Hall of Meetings=
 +
'''When:''' September 25th, 11:30am - 1:00pm
 +
 +
'''Topic: ''' Vulnerability Spidey Sense (Sponsored by SolarWinds)
 +
 +
'''Who:''' Daniel Crowley and Chris Vinecombe
 +
 +
'''Synopsis:'''This talk will cover scenarios which raise red flags for us, why, and how to develop your own sense of intuition.
 +
 +
'''Cost: Free'''
 +
 +
''':RSVP: http://www.eventbrite.com/event/4319523812
  
 
----
 
----

Revision as of 19:19, 17 December 2012

OWASP Austin

Welcome to the Austin chapter homepage. The chapter leadership includes: David Hughes, President/Conference Chair, Paul Griffith, Vice President,Josh Sokol, Conference Chair, James Wickett, Conference Chair, Rich Vazquez, Board Member, Greg Genung, Board Member


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG




January OWASP Austin Chapter Meeting

When: January 29th from 11:30a - 1:00p

Who: Wendy Nather


Topic: Data events, or why security is cloudier than you think.

Abstract: Data security doesn't involve just securing data at rest or in transit. It also needs to be secured in use ­ which means that at any point, the characteristics of the data can change. We call this situation a "data event," and it can mean that security requirements have to change as a result.

This is not the same thing as logging event data; this is taking into account changes in the combination, use or business context surrounding specific data. For example, a press release is confidential and requires a certain set of security policies in the areas of access control, DLP, key management (if encryption is involved), and so on. But once the business event occurs, the press release suddenly becomes the opposite of confidential, and all the policies have to change immediately as a result.

Data events can also occur when data elements are combined in particular ways so that they become covered by regulations. A query might produce a small enough sample size that it needs to be treated as protected information, or a doctor becomes a patient so that her name is now protected by HIPAA. Data events are often tied closely to the business context, and as such can mirror transactions and workflows.

Data events are important because traditional security policies have been applied to the current container of the data: this database is confidential because some rows are confidential, or this Word document requires access control (but its content can be copied and pasted somewhere else). Container-centric security is too static for today's high-speed, big-data, cloud-based (pick as many buzzwords as you like) processing.

This talk will describe the concept of data events, and will invite audience discussion on how security controls can be adapted to them.


Food: Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all! Only those who RSVP will be eligible for any drawings/giveaways that may take place!


Location: National Instruments, 11500 N. Mopac.Building C

RSVP: Posting soon.


And if for some reason you cannot make it in person, make sure that you sign up for the GoToWebinar and join us virtually:


To Join the Webinar:

1. At the time listed above, click this link to join the Webinar: https://www.gotomeeting.com/register/891195518

Webinar ID: 891-195-518


Questions? call: David Hughes (512) 589-4623



Future Speakers and Events

  • January 29th, 2013 -11:30 AM to 1 PM, Austin OWASP Meeting, Data events, or why security is cloudier than you think - Wendy Nather, 451 Group


  • September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting (Sponsored by Solarwinds) Vulnerability Spidey Sense - Daniel Crowely and Chris VineCombe
  • October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!
  • November 2012 - No Meeting (Happy Holidays!)
  • December 2012 - No Meeting (Happy Holidays!)

How to add a new Austin article

You can follow the instructions to make a new Austin article. Please use the appropriate structure and follow the Tutorial. Be sure to paste the following at the end of your article to make it show up in the Austin category:

[[Category:Austin]]