This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Long Island"

From OWASP
Jump to: navigation, search
Line 15: Line 15:
 
;10-20 - What is OWASP and how can we help you?
 
;10-20 - What is OWASP and how can we help you?
 
:TBD
 
:TBD
;11-20 - Presentation TBD
+
;11-20 - Incident Response - Identify, Contain, Eradicate, Recover, Lessons Learned
:TBD
+
:Description TBD
 +
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan] Manager of Network Technologies at [http://www.ntst.com/ Netsmart Technologies]
 
;12-10 - Lunch TBD
 
;12-10 - Lunch TBD
 
:TBD
 
:TBD
;12-25 - Code Blue - The Unhealthy State of Your Medical Records and What Can Be Done to Save Them.
+
;12-25 - Code Blue - The Unhealthy State of Your Medical Records (And What Can Be Done to Save Them)
 
:Millions of patient records have been disclosed to unauthorized third parties.  Some of these records were stolen, some were lost yet all could have been prevented.
 
:Millions of patient records have been disclosed to unauthorized third parties.  Some of these records were stolen, some were lost yet all could have been prevented.
  

Revision as of 20:09, 10 June 2009

OWASP Long Island

Welcome to the Long Island chapter homepage.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Chapter Meetings

Scroll down to see the upcoming Long Island OWASP events

Date: Saturday June 27th 2009
Time: 10:00-14:00
Place: Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 MAP
Directions: Enter from the service road on the East Bound side of Sunrise Hwy. Attendees can park in front of Building 200 and enter through the Building 200 entrance. We must ask that all Attendees do not park in any spot marked as RESERVED.

RSVP REQUIRED Register.gif


Agenda:

10-00 - Opening Remarks & Welcome
TBD
10-20 - What is OWASP and how can we help you?
TBD
11-20 - Incident Response - Identify, Contain, Eradicate, Recover, Lessons Learned
Description TBD
--Ryan Behan Manager of Network Technologies at Netsmart Technologies
12-10 - Lunch TBD
TBD
12-25 - Code Blue - The Unhealthy State of Your Medical Records (And What Can Be Done to Save Them)
Millions of patient records have been disclosed to unauthorized third parties. Some of these records were stolen, some were lost yet all could have been prevented.

A North Carolina hospital loses a laptop with 14,000 records. The Peninsula Orthopedic Associates lost backup tapes that help 100,000 patient records. The Wallgreens Health Initiative emailed 28,000 records to the state of Kentucky without using encryption. Confiker infects three University of Utah hospitals. Kaiser fires 15 employees for inappropriately accessing medical records. Two Scottish hospitals were infected by a computer worm. Researchers find 20,000 medical records using peer-to-peer software. The Mytob worm infects 4,700 computers at three UK hospitals. Confiker infects 8,000 computers at the Sheffield Teaching Hospitals Trust. Criminals tried to extort Express Scripts with the threat of releasing millions of patient records. SRA International was breached when malicious software allowed an attacker the ability to access patient data maintained by SRA. The list goes on.

All of these incidents were reported in the news within a five month period of each other. These types of news are being reported with increasing frequency.

Most of these incidents could have been easily avoided by conducting compliance audits and vulnerability assessments.

We will walk through the most recent and most devastating incidents at health care facilities around the world and detail how they could have been prevented.

--Blake Cornell Security Consultant Net2S/BT-INS, OWASP NY/NY/LI Board Member
13-25 - Presentation TBD
TBD
Come prepared for a day of networking with your industry peers.
We invite all attendees to food and libations after the meeting at a local restaurant TBD.
If you join our mailing list, then you will receive details of the meeting as soon as they are finalized.
To be a co-sponsor for this or a future meeting consider annual chapter sponsorship


Chapter Leaders/Contacts


External Links