This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Cambridge

From OWASP
Revision as of 10:01, 6 December 2016 by Steven van der Baan (talk | contribs)

Jump to: navigation, search

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


<paypal>Cambridge</paypal>

Local News

Cambridge OWASP Chapter Meeting

Thursday 13th December 2016 17:45 – 20:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge.

Hosted by the Department of Computing & Technology, Anglia Ruskin University, Institute of Information Security Professionals (IISP) East Anglia Branch and OWASP (Open Web Application Security Project) Cambridge Chapter

Guest speakers: Guest speaker: Ken Munro from Pen Test Partners, Chris Dye from Glasswall and Ilkka Turunen from Sonatype


Guest speaker: Ken Munro, Partner, Pen Test Partners

Abstract: “The Thermostat, the Hacker, and the Malware"

Following the PoC thermostat ransomware that Pen Test Partners performed at DefCon 24, this presentation digs even deeper into IoT devices and their apps. Staying with the thermostat Ken will walk through the ransomware attack and then move onto general malware - which has no easy method for detection. Even when firewalled these devices are still vulnerable to local attacks so we’ll show you how you can achieve a compromise.


Guest Speaker: Chris Dye VP Marketing & Communications, Glasswall

Abstract: Prevention is better than cure – don ’ t assume opening a business document is risk free!

The security industry’s attempt to defend organisations by classifying known bad e.g. signatures or heuristics, is not succeeding, and the industry has turned its focus from prevention to post infection detection and breach mitigation. Today’s advanced, targeted cyber-attacks use weaponized files as an attack vector with a huge success rate. File-based threats involve hiding malware or malicious code within a common file-types, such as Word, Excel or PDF files. Conventional security controls such as firewalls, AV, and more advanced dynamic network sandboxes are ineffective in dealing with these types of threats as they only identify known threats or are unsuccessful in identifying exploits in the files. Chris will share how files are being manipulated and show the trends in attacks and techniques that can be deployed to eliminate document based attacks.


Guest Speaker: Ilkka Turunen -Solutions Architect at Sonatype

Abstract: DevSecOps - Security at Devops speed

Software development is pressed for faster and faster release cycles with acceptable quality, budget and security. As movements like CI, CD and Devops aim to cut down on release cycles, it's security's job to help control the risk. The risk landscape is complex as modern development practices increasingly consume more and more third party code. Traditional methods do not cut it anymore - it's time for DevSecOps. This session gives an overview of how companies have implemented DevSecOps practices in their own delivery pipelines and how this can help increase developer awareness of risks affecting them. We'll walk an example CICD Pipeline and explore how security has been embedded as a part of it, how the movement is shaping up and how standards are starting to follow suite.


Biography: Ken Munro

Ken is a regular speaker at events such as the ISSA Dragon’s Den, (ISC)2 Chapter events and CREST (Council of Registered Ethical Security Testers), where he sits on the board. He’s also an Executive Member of the “Internet of Things Security Forum”, a body that aims to promote best security practice and the application of controls in smart device manufacturing, and spoke out on IoT security design flaws at the forum’s inaugural event. He’s also not averse to getting deeply techie, regularly participating in hacking challenges and demos at Black Hat, 44CON, DefCon and Bsides. Ken has a wealth of experience in penetration testing but it’s the systems and objects we come into contact with on an everyday basis that really pique his interest. This has seen him hack everything from keyless cars and a range of Internet of Things (IoT) devices, from wearable tech to children’s toys and smart home control systems. This has gained him notoriety among the national press, leading to regular appearances on BBC TV and BBC News online as well as the broadsheet press. He’s also a familiar contributor to industry magazines, penning articles for the legal, security, insurance, oil and gas, and manufacturing press.


Biography: Chris Dye

Having originally trained in electrical engineering and power generation Chris moved initially into IT recruitment and now has over 30 years’ experience of working in IT software and services companies. His career has spanned almost every operational, sales and marketing disciplines including investor relations, company operations, product analysis and design, recruitment, sales and marketing. He is also an experienced training consultant delivering talent development, sales and relationship management programs to commercial and technology companies. An entrepreneur at heart Chris has been involved in Glasswall since the beginning and is now heading up the marketing of its unique and disruptive technology.


Biography: lkka Turunen, Sonatype

Ilkka Turunen is a Solutions Architect working at Sonatype in Europe and Asia. His background is in software and systems engineering, acting as an architect for several commercial projects. He's helped define everything from the software design to web- scale infrastructure architectures and regularly works with companies across the world to understand and improve their software supply chain and continuous delivery pipelines.


Agenda

17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University

17:45 - 18:30 Talk from Ken Munro – Pen Test Partners “The Thermostat, the Hacker, and the Malware"

18:30 - 19:15 Talk from Chris Dye, Glasswall “Prevention is better than cure – don’t assume opening a business document is risk free!”

19:15 – 20:00 Talk from Ilkka Turunen – Sonatype “DevSecOps - Security at Devops speed”

20:00 - 20:30 Refreshments & Networking (coffee, tea, juice) in LAB006 - Sponsored by Sonatype


Registration:

To register for this free event, please register online here

The conference will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.


Meeting Location

Anglia Ruskin University

Cambridge Campus

East Road

Cambridge

CB1 1PT

Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html

Everyone is welcome to join us at our chapter meetings.


Planned dates for upcoming events


Thursday 19th January 2017

Wednesday 25th January 2017

Tuesday 7th February 2017

Tuesday 7th March 2017

Tuesday 4th April 2017

Date Name / Title Link
10 Nov 2016 Graham Rymer / University of Cambridge
10 Nov 2016 Mark Wickenden
12 05 2016 Phil Cobley / Modern Policing & the Fight Against Cyber Crime presentation
12 05 2016 Jules Pagna Disso / Building a resilient ICS presentation
08 03 2016 Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence
10 11 2015 Steve Lord / Trying (and failing) to secure the Internet of Things
John Mersh / Software and System Security: a life vest in the IoT ocean
10 Oct 2015 Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault
10 Feb 2015 Steven van der Baan / Web Application Security Testing with Burp Suite
2 December 2014 Colin Watson / OWASP Cornucopia
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation