This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Cambridge
OWASP Cambridge
Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
<paypal>Cambridge</paypal>
Local News
Cambridge OWASP Chapter Meeting
Thursday 13th December 2016 17:45 – 20:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge.
Hosted by the Department of Computing & Technology, Anglia Ruskin University, Institute of Information Security Professionals (IISP) East Anglia Branch and OWASP (Open Web Application Security Project) Cambridge Chapter
Guest speakers: Guest speaker: Ken Munro from Pen Test Partners, Chris Dye from Glasswall and Ilkka Turunen from Sonatype
Guest speaker: Ken Munro, Partner, Pen Test Partners
Abstract: “The Thermostat, the Hacker, and the Malware"
Following the PoC thermostat ransomware that Pen Test Partners performed at DefCon 24, this presentation digs even deeper into IoT devices and their apps. Staying with the thermostat Ken will walk through the ransomware attack and then move onto general malware - which has no easy method for detection. Even when firewalled these devices are still vulnerable to local attacks so we’ll show you how you can achieve a compromise.
Guest Speaker: Chris Dye VP Marketing & Communications, Glasswall
Abstract: Prevention is better than cure – don ’ t assume opening a business document is risk free!
The security industry’s attempt to defend organisations by classifying known bad e.g. signatures or heuristics, is not succeeding, and the industry has turned its focus from prevention to post infection detection and breach mitigation. Today’s advanced, targeted cyber-attacks use weaponized files as an attack vector with a huge success rate. File-based threats involve hiding malware or malicious code within a common file-types, such as Word, Excel or PDF files. Conventional security controls such as firewalls, AV, and more advanced dynamic network sandboxes are ineffective in dealing with these types of threats as they only identify known threats or are unsuccessful in identifying exploits in the files. Chris will share how files are being manipulated and show the trends in attacks and techniques that can be deployed to eliminate document based attacks.
Guest Speaker: Ilkka Turunen -Solutions Architect at Sonatype
Abstract: DevSecOps - Security at Devops speed
Software development is pressed for faster and faster release cycles with acceptable quality, budget and security. As movements like CI, CD and Devops aim to cut down on release cycles, it's security's job to help control the risk. The risk landscape is complex as modern development practices increasingly consume more and more third party code. Traditional methods do not cut it anymore - it's time for DevSecOps. This session gives an overview of how companies have implemented DevSecOps practices in their own delivery pipelines and how this can help increase developer awareness of risks affecting them. We'll walk an example CICD Pipeline and explore how security has been embedded as a part of it, how the movement is shaping up and how standards are starting to follow suite.
Biography: Ken Munro
Ken is a regular speaker at events such as the ISSA Dragon’s Den, (ISC)2 Chapter events and CREST (Council of Registered Ethical Security Testers), where he sits on the board. He’s also an Executive Member of the “Internet of Things Security Forum”, a body that aims to promote best security practice and the application of controls in smart device manufacturing, and spoke out on IoT security design flaws at the forum’s inaugural event. He’s also not averse to getting deeply techie, regularly participating in hacking challenges and demos at Black Hat, 44CON, DefCon and Bsides. Ken has a wealth of experience in penetration testing but it’s the systems and objects we come into contact with on an everyday basis that really pique his interest. This has seen him hack everything from keyless cars and a range of Internet of Things (IoT) devices, from wearable tech to children’s toys and smart home control systems. This has gained him notoriety among the national press, leading to regular appearances on BBC TV and BBC News online as well as the broadsheet press. He’s also a familiar contributor to industry magazines, penning articles for the legal, security, insurance, oil and gas, and manufacturing press.
Biography: Chris Dye
Having originally trained in electrical engineering and power generation Chris moved initially into IT recruitment and now has over 30 years’ experience of working in IT software and services companies. His career has spanned almost every operational, sales and marketing disciplines including investor relations, company operations, product analysis and design, recruitment, sales and marketing. He is also an experienced training consultant delivering talent development, sales and relationship management programs to commercial and technology companies. An entrepreneur at heart Chris has been involved in Glasswall since the beginning and is now heading up the marketing of its unique and disruptive technology.
Biography: lkka Turunen, Sonatype
Ilkka Turunen is a Solutions Architect working at Sonatype in Europe and Asia. His background is in software and systems engineering, acting as an architect for several commercial projects. He's helped define everything from the software design to web- scale infrastructure architectures and regularly works with companies across the world to understand and improve their software supply chain and continuous delivery pipelines.
Agenda
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University
17:45 - 18:30 Talk from Ken Munro – Pen Test Partners “The Thermostat, the Hacker, and the Malware"
18:30 - 19:15 Talk from Chris Dye, Glasswall “Prevention is better than cure – don’t assume opening a business document is risk free!”
19:15 – 20:00 Talk from Ilkka Turunen – Sonatype “DevSecOps - Security at Devops speed”
20:00 - 20:30 Refreshments & Networking (coffee, tea, juice) in LAB006 - Sponsored by Sonatype
Registration:
To register for this free event, please register online [https://www.eventbrite.com/e/owasp-cambridge-chapter-malevolent-devices- documents-development-security-seminar-tickets-29668008813 here]
The conference will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking & refreshments).
Please enter through the Helmore Building and ask at reception.
Meeting Location
Anglia Ruskin University
Cambridge Campus
East Road
Cambridge
CB1 1PT
Get further information on travelling to the university.
Everyone is welcome to join us at our chapter meetings.
Planned dates for upcoming events
Thursday 19th January 2017
Wednesday 25th January 2017
Tuesday 7th February 2017
Tuesday 7th March 2017
Tuesday 4th April 2017
Date | Name / Title | Link |
---|---|---|
10 Nov 2016 | Graham Rymer / University of Cambridge | |
10 Nov 2016 | Mark Wickenden | |
12 05 2016 | Phil Cobley / Modern Policing & the Fight Against Cyber Crime | presentation |
12 05 2016 | Jules Pagna Disso / Building a resilient ICS | presentation |
08 03 2016 | Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence | |
10 11 2015 | Steve Lord / Trying (and failing) to secure the Internet of Things | |
John Mersh / Software and System Security: a life vest in the IoT ocean | ||
10 Oct 2015 | Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault | |
10 Feb 2015 | Steven van der Baan / Web Application Security Testing with Burp Suite | |
2 December 2014 | Colin Watson / OWASP Cornucopia | |
21 October 2014 | Eireann Leverett | presentation |
1st April 2014 | Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry. | |
Yiannis Chrysanthou (KPMG) / Modern Password Cracking | ||
Damien King (KPMG) / Filename Enumeration with TildeTool | ||
12th November 2013 | Paul Cain / Tracking Data using Forensics | |
12th November 2013 | James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations | presentation |
5th March 2013 | Sarantis Makoudis / Android (in)Security | presentation |
5th March 2013 | Nikhil Sreekumar / Power On, Powershell | presentation |