This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Houston"

From OWASP
Jump to: navigation, search
Line 7: Line 7:
 
=====Monday October 17, 2016 at 6:30PM=====
 
=====Monday October 17, 2016 at 6:30PM=====
  
Title: Is Your Vulnerability Management Program Evolving? Introducing the Vulnerability Management Maturity Model – VM3
+
Title: Murder Mystery – Who is Killing your Information Security Program
  
 
Speaker: Gordon MacKay
 
Speaker: Gordon MacKay
Line 13: Line 13:
 
Presentation Abstract:
 
Presentation Abstract:
  
Vulnerability management (VM) solutions and products that are central to every information security program contain a serious “hidden” flaw. This software flaw is interleaved within pattern matching-like algorithms located deep within the foundational core of the most widely used automated VM solutions on the market. As a direct consequence of this flaw, even though these products report a certain level of network security risk, the metric upon which their calculations are based is skewed, resulting in an unintentional gap between the products’ intended information risk measurement and the erroneous measurement actually reported. This session covers the technical details of the referred to hidden flaw, its consequences and what you can do to limit your exposure.
+
Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results in heinous consequences, thereby killing your InfoSec program. This session shares clues on this challenge, step by step, in the form of a murder mystery game, and ultimately reveals the culprit as well as strategies to overcome it. Come participate, play, and interact! Try to guess “who-dunnit,and learn how to avoid future similar InfoSec crimes.
  
Speaker Bio  
+
Speaker Bio
 
 
Gordon MacKay, CISSP, serves as CTO for Digital Defense, Inc. He applies mathematical modeling and engineering principles in investigating solutions to many of the challenges within the information security space.  His solution to matching network discovered hosts within independent vulnerability assessments across time resulted in achieving patent-pending status for the company’s scanning technology. MacKay has presented at numerous security related conferences, including Bsides Austin 2016, BSides San Antonio 2016, BSides Dallas 2015, RSA 2013, ISC2 San Antonio, ISSA Houston, ISACA San Antonio, and has been featured by top media outlets such as CIO Review, FOX Business, Fox News, Softpedia, IT World Canada and others. He holds a Bachelor's in Computer Engineering from McGill University.  He is a Distinguished Ponemon Institute Fellow.
 
  
 +
Gordon MacKay, CISSP and Software/Systems Guru with a dash of security hacking,serves as CTO for Digital Defense, Inc. He applies mathematical modeling and engineering principles in investigating solutions to many of the challenges within the information security space. His solution to matching network discovered hosts within independent vulnerability assessments across time resulted in achieving patent-pending status for the company’s scanning technology. MacKay has presented at numerous security related conferences, including Bsides Austin 2016, BSides San Antonio 2016, BSides Dallas 2015, RSA 2013, ISC2 San Antonio, ISSA Houston, ISACA San Antonio, and has been featured by top media outlets such as CIO Review, FOX Business, Fox News, Softpedia, IT World Canada and others. He holds a Bachelor's in Computer Engineering from McGill University. He is a Distinguished Ponemon Institute Fellow.
  
 
Building security requires the list of attendees with their full names by the Friday prior to the meeting, so please signup by the Thursday before the meeting.
 
Building security requires the list of attendees with their full names by the Friday prior to the meeting, so please signup by the Thursday before the meeting.

Revision as of 14:20, 23 September 2016

OWASP Houston

Welcome to the Houston chapter homepage. The chapter Leaders are; Joseph Konieczka, Landon Mayo, Patrick Snyder, Paul Scott, Tyler Borland, Tom Cline, Johnathan Kuskos


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


OWASP Houston October Chapter Meeting
Monday October 17, 2016 at 6:30PM

Title: Murder Mystery – Who is Killing your Information Security Program

Speaker: Gordon MacKay

Presentation Abstract:

Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results in heinous consequences, thereby killing your InfoSec program. This session shares clues on this challenge, step by step, in the form of a murder mystery game, and ultimately reveals the culprit as well as strategies to overcome it. Come participate, play, and interact! Try to guess “who-dunnit,” and learn how to avoid future similar InfoSec crimes.

Speaker Bio

Gordon MacKay, CISSP and Software/Systems Guru with a dash of security hacking,serves as CTO for Digital Defense, Inc. He applies mathematical modeling and engineering principles in investigating solutions to many of the challenges within the information security space. His solution to matching network discovered hosts within independent vulnerability assessments across time resulted in achieving patent-pending status for the company’s scanning technology. MacKay has presented at numerous security related conferences, including Bsides Austin 2016, BSides San Antonio 2016, BSides Dallas 2015, RSA 2013, ISC2 San Antonio, ISSA Houston, ISACA San Antonio, and has been featured by top media outlets such as CIO Review, FOX Business, Fox News, Softpedia, IT World Canada and others. He holds a Bachelor's in Computer Engineering from McGill University. He is a Distinguished Ponemon Institute Fellow.

Building security requires the list of attendees with their full names by the Friday prior to the meeting, so please signup by the Thursday before the meeting.


Please use the following Eventbrite link to register for the meeting. https://www.eventbrite.com/e/owasp-houston-october-chapter-meeting-monday-october-17-2016-at-630pm-tickets-27944601054