This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Minneapolis St Paul 2008 Conference
OWASP & FLOSS Application Security Mini-Conference 2008 - October 21, 2008
The Minneapolis - Saint Paul Chapter invites you to attend the first ever Minnesota OWASP Conference on October 21st.
We're very excited out the line up of internationally known speakers we were able to bring together for this one day of Application Security talks at the University of Minnesota's St. Paul Student Center (parking and transportation information below). There is a nominal fee of $25.00 per person, which includes lunch. Seating is limited and we expect this event to sell out. On site registration is not expected to be available the day of the event, so please register prior to the event to guarantee your seat.
Tentative Agenda
8:00-9:00 | Registration / Check-In |
9:00-9:30 | Kuai Hinojosa OWASP MN President Conference Introduction |
9:30-10:30 |
Jeff Williams Application security is getting more complicated every day with increasing connectivity, more mixing of code and data, more parsers, more interpreters, more assets, and more functionality available. We have to take steps now to simplify the problem. So if you?re tired of securing one application at a time, and wrestling with the same vulnerabilities again and again, establishing your organization's ESAPI is one of the best things you can do? Bio: I'm Jeff Williams, I work as CEO of Aspect Security and I serve as the volunteer Chair of the OWASP Foundation. I've worked on a number of projects at OWASP, including creating the OWASP Top 10, WebGoat, Stinger, Secure Software Contract Annex, Honeycomb Project and the Enterprise Security API. You can find more about my background here: http://myappsecurity.blogspot.com/2007/03/reflection-on-jeff-williams.html. |
10:30-11:00 | Arshan Dabirsiaghi Director of Research, Aspect Security Many of the challenges we face in application security could be solved at an architectural layer without trying to accomplish the impossible task of fixing millions of websites with billions of lines of code behind them. The OWASP Intrinsic Security Working Group is a new OWASP effort focused on addressing root causes of application security problems and fixing them where it's easiest. |
11:00-12:30 |
Lunch |
12:30-13:30 |
Anil Kumar Revuru
Microsoft Connected Information Security Framework (CISF) and Tools: Bio: Anil Kumar Revuru currently works for Microsoft as a Security Technologist where he is responsible for architecting security tools. In his previous life at Microsoft, Anil was conducting security design reviews, threat modeling, and application and source-code assessments. Previously as a Security Consultant for a security services vendor, he helped Fortune 100 clients evaluate the security of their software products and applications. He has authored security tools and has presented courses internally at Microsoft. Anil holds a Diploma in Mechanical Engineering from JNTU Hyderabad. Anil displayed expert proficiency in the substantive and technical areas of design and development, He also made significant contribution to the security development of products at V-Empower Inc. After joining in Microsoft, he worked towards finding security weaknesses and providing necessary countermeasures to application teams. He excelled in his abilities by developing security tools such as Microsoft Threat Analysis and Modeling Tool used for application threat modeling |
1:30-2:30 | Brian Chess Fortify Software Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine tooth comb and uncover the kinds of errors that lead directly to vulnerabilities. This talk frames the software security problem and shows how static analysis is part of the solution. Highlights include:
We will look at how static analysis works, how to integrate it into the software development processes, and how to make the most of it during security code review. Bio: Dr. Chess's research focuses on methods for creating secure systems. He received his Ph.D. from the University of California at Santa Cruz, where he applied his background in integrated circuit test and verification to the problem of identifying security errors in software. In addition to authoring numerous patents and technical papers, Dr. Chess has more than ten years of experience in the commercial software arena, having led development efforts at Hewlett Packard and NetLedge |
2:30-3:00 |
Break |
3:00-4:00 |
Elliot Glazer Information Security Architecture Layers and Key Processes:
Bio: Elliott has over 25 years of information technology experience and has worked in the security field for over 10 years. He is currently Director of Security Architecture for the Depository Trust and Clearing Corporation (DTCC), where he has created a number of innovative solutions in the areas of security monitoring and security architecture. He also provides consulting to the organization on critical security issues. Prior to this, Mr. Glazer was Vice President for Security Solutions at American Express, leading many large and small solutions for the Internet, Security, Privacy, and Customer Servicing. Previous to this, Elliott held leadership positions at Citigroup, Sprint International, and BT Dialcom in software development and operations. He has led architecture, development, and operations organizations including an enterprise architecture group, Internet software development, and distrbitured operations among others. |
4:00-5:00 |
Corey Benninger Exploring the how poor application security mixed with a phishing is leading to a costly cocktail of disaster. This talk will go over real world examples of phishing attacks that have taken advantage of cross site scripting flaws, SQL injection vulnerabilities, session fixation attacks, and others web application flaws. Learn what phishers are doing to take their attacks to the next level by chaining multiple vulnerabilities together. The presentation will also share resources that help to track phishing trends and research. Bio: Corey is a Principal Consultant with the Intrepidus Group, specializing in web and mobile application security. He has performed code reviews and conducted application penetration tests for numerous Fortune 500 clients. Prior to joining Intrepidus Group’s professional services team, Corey served as a Senior Consultant and Trainer at Foundstone. Corey is a polished public speaker and has been invited to speak at leading conferences like Black Hat, OWASP AppSec, NYCBSDCon, Secure Development World and Infragard. In addition, his expert opinion has been published in industry publications like eWeek. He has also published several whitepapers on cutting edge security issues, like vulnerabilities in AJAX, and the security implications of web browser data caching. He is the co-founder and leader of the OWASP Mobile Security Project, a consortium of mobile security developers and experts. Corey has an undergraduate degree from Boston University. He is a Certified Information Systems Security Professional (CISSP). |
5:00-5:15 |
Richard Stallman |
Parking and Transportation
Public Parking: http://www1.umn.edu/pts/publicparking.htm
Map of St. Paul Campus Parking (PDF): http://www1.umn.edu/pts/maps/spcont.pdf
Campus Connector Shuttle: http://www1.umn.edu/pts/shuttle.htm
Metro Bus information: http://www1.umn.edu/pts/metrobuses.htm
Thank You To Our Sponsors
Center for Strategic Information Technology and Security
Conference space provided courtesy of the University of Minnesota Office of Information Technology University of Minnesota