This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Past Presentations)
(Past Presentations)
Line 80: Line 80:
  
 
== Past Presentations ==
 
== Past Presentations ==
 +
<b>May Meeting 2010</b> New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]]
 +
 
<b>February Meeting 2010</b> DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]
 
<b>February Meeting 2010</b> DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]
  

Revision as of 15:54, 26 May 2010


Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leader is Andrea Cogliati

<paypal>Rochester</paypal>

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found here. The discussion mailing list can be found here. You can also review the announce and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to announce to receive any last minute meeting info.

Local Officers

Meeting Dates & Location

Dates: The third Monday of every month, starting at 6:00 PM.

Types of events: Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months

Locations:

  • Mykonos Software has been graciously providing meeting space for our formal meetings. Mykonos is located at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road.
  • Beer and wings at Mac Gregor's Grill & Tap Room, 300 Jefferson Rd, NY 14623 Google Maps

Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.

If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.

Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.

June Meeting - Joint Meeting with ISSA

When: June 10th, 2010, 6-7:30pm

Location: BlueTie, 220 Kenneth Drive, Rochester, NY (entrance from W Henrietta Rd or Lehigh Station Rd)

Please RSVP at [email protected] by Friday, June 10th

Title: Client Side Exploits 101

Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS

Abstract: JP will talk about some concepts of client side attacks. An introduction to Metasploit will be given. A case study of how to craft a malicious PDF payload will be demonstrated to introduce some of the key features and abilities of Metasploit and it's plugin's/modules. JP will go over some of the basics of Nmap and then suggest some ideas on how to defend against these types of attacks.

Speaker's bio: JP has five years experience in computer networking, system administration, and information security. During the day JP is responsible for Network and Security Management for a medium size global company based in the US. JP is also adjunct faculty at Rochester Institute of Technology where he teaches Networking and Security undergraduate classes. JP also performs pen testing and security audits for local companies in Rochester, NY.

Past Events

May Meeting

Topic: New Techniques in Application Intrusion Detection
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.

February Meeting

Ralph Durkee presented a recap of the recent AppSec conference in DC.
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.


Oct 29-30 2008 - Rochester Security Summit 2008
The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month. This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.

Visit Rochester Security Summit Site for details.

Past Presentations

May Meeting 2010 New Techniques in Application Intrusion Detection by Al Huizenga PPTX

February Meeting 2010 DC AppSec Conference Recap by Ralph Durkee PPT

October Hackerfest 2009 Introduction to OWASP Rochester by Ralph Durkee, Lou Leone PPT

September OWASP 2009 Securing Apache Web Servers with Mod Security & CIS Benchmark by Ralph Durkee PPT Open Office

May OWASP 2009 Key Management - One Perspective by Lou Leone PPT

May IEEE 2009 Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati PPT

January 2009 Paranoid Programming Practices, by Lou Leone and Aaron Witt PPT

May 2008 Database Encryption, by Ralf Durkee PPT

January 2008 SQL Injection and Dynamic SQL, by Andrea Cogliati ZIP

September 2007 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee PowerPoint

October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint