This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Leeds UK/June 2012

From OWASP
Revision as of 09:08, 14 September 2012 by Mike Woodhead (talk | contribs) (Created page with "'''Date:''' Wednesday 13th June Leeds '''Location''' This chapter meeting is being kindly hosted by [PWC http://www.pwc.co.uk/governance-risk-compliance/issues/sustainable-in...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Date: Wednesday 13th June Leeds

Location This chapter meeting is being kindly hosted by [PWC http://www.pwc.co.uk/governance-risk-compliance/issues/sustainable-information-security.jhtml]. Please ensure you RSVP with a REAL name so that we can supply the information to PWC building security. Please register on eventbrite here: http://www.eventbrite.com/event/3688111240

https://maps.google.com/maps?f=q&hl=en&q=LS1+4JP&ll=53.796576,-1.556271&spn=0.012218,0.042915


Schedule: 18:15 for 18:30 start

18:30-18:45

OWASP Chapter introduction. OWASP values and membership. Chapter information.

OWASP Leeds board member

18:45-19:45

Jason Alexander - Security Architect KPMG, OWASP board member

Utilising OWASP resources to build security into the SDLC - In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.

19:45-20:45

Jason Steer - has worked in IT security for 15 years and works as a solution architect for Silver Tail across Europe

Silver Tail - will discuss and walk through some real world attacks being seen by our customers web applications from banking, ecommerce, travel etc to show various business logic abuse cases of website functionality. Attacks are on the rise however most businesses are not aware of the extent of attacks on an hourly basis.


20:45-close