This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Gwalior"
(→Past Events) |
(→2015 Past Events) (Tag: Visual edit) |
||
Line 1: | Line 1: | ||
− | {{Chapter Template|chaptername=Gwalior|extra=The chapter leaders are [mailto:[email protected] Sumit Ojha] and [mailto:[email protected] Amit Ojha]. | + | May 2016 - Identity Access Managemeent{{Chapter Template|chaptername=Gwalior|extra=The chapter leaders are [mailto:[email protected] Sumit Ojha] and [mailto:[email protected] Amit Ojha]. |
|meetupurl=https://www.meetup.com/OWASP-Gwalior-Chapter/|region=Asia/Pacific/Middle East}} | |meetupurl=https://www.meetup.com/OWASP-Gwalior-Chapter/|region=Asia/Pacific/Middle East}} | ||
Line 272: | Line 272: | ||
8:30 - Networking | 8:30 - Networking | ||
− | '''May 2016 - | + | '''May 2016 - Identity Access Managment''' |
+ | *'''Time''' : 09:00 AM | ||
+ | *'''Speakers''' : Sumit Ojha, Abhinav Sharma, Kajal Samant, Deepak Gupta | ||
+ | *Sumit Ojha ( Intro Session, Common Authentication Methods used for Network Security) | ||
+ | ** '''Biometrics''' for Network Security. | ||
+ | ** Token Authentication. | ||
+ | ** | ||
+ | *Abhinav Sharma (Multi Factor Authentication) | ||
+ | *Deepak Gupta (Out of Band Authentication) | ||
+ | *Kajal Samant (Oauth vs SSO) | ||
+ | * | ||
+ | * | ||
+ | * '''Out-of-Band Authentication''' ('''OOB''') | ||
+ | *'''e''' : ICS institute Gwalior | ||
− | + | '''March 2016 - Identity Access Managment''' | |
− | + | * | |
− | + | * | |
− | + | *'''Time''' : 10:45 AM | |
− | + | *'''Speakers''' : Sumit Ojha, Krishna Gole, | |
− | + | *Sumit Ojha ( Intro Session, Authentication methods:- SSO, Two Factor Authentication, Kerberos ) | |
− | + | *Krishna Gole (Biometrics) | |
− | + | *'''Venue''' : ICS institute Gwalior | |
− | ''' | + | Persistent Systems Limited Nagpur 440 022 |
− | + | *'''Agenda''' : Modern Web Application Vulnerabilities | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | ''' | ||
=== 2015 Past Events === | === 2015 Past Events === | ||
− | OWASP | + | OWASP Gwalior first chapter was held in Hotel Ambiance Gwalior in 29 October, 2015 - On "The rise of Digital Terrorism" |
==== Older Events ==== | ==== Older Events ==== | ||
[[Owasp Gwalior Past Events]] | [[Owasp Gwalior Past Events]] |
Revision as of 05:46, 30 April 2019
May 2016 - Identity Access Managemeent
OWASP Gwalior
Welcome to the Gwalior chapter homepage. The chapter leaders are Sumit Ojha and Amit Ojha.
Upcoming Events
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Local News
Meeting Location
Past Events
2018 Past Events
March 2018 - AppDynamics
• 6:30 - Doors open
• 7:00-7:30 - HUNT: Data Driven Web Hacking & Manual Testing (JP Villanueva)
• 7:35-8:05 - Detecting suspicious activity: Time-based analysis of DNS traffic (Barak Raz)
• 8:05-9:00 - Networking
March 2018 - Intuit
• 6:30 - Doors open
• 7:00-7:30 New Attacks Against Unencrypted Traffic (Travis Hassloch)
• 7:35-8:05 - "Offensive Defense" - The best defense is a good offense (Stephan Chenette)
• 8:05-9:00 - Networking
*Special Event* - February 2018 - HackerOne
Hacker Thursday - Mobile Application Security
*Special Event* - January 2018 - CircleCI
Hacker Thursday - Application Security Automation with OWASP ZAP 2.7.0
January 2018 - Smyte
• 6:30 - Doors open
• 6:45 - 6:55 News Bites (Lina)
• 7:00-7:30 - Simple is Better: Fighting Online Abuse with Rate Limiter
• 7:35-8:05 - Reporter -> P.I. -> Security Engineer - How Curiosity Led to an InfoSec Career (Tad Whitaker)
• 8:10-8:40 - XXE Vulnerabilities: From the Beginning Till Now (Ivan Novikov)
• 8:40-9:00 - Networking
2017 Past Events
*Special Event* - December 2017 - Shape Security
Hacker Thursday - Unorthodox Security Assessment: OSINT for Intelligent Attacks
Nutan Kumar Panda
December 2017 - Contrast Security
• 6:30 - Doors open
• 6:45-7:00 - Welcome
• 7:00-8:00 - Three Ways of Security (Jeff Williams)
• 8:00-9:00 - Networking and Giveaways!
November 2017 - Credit Karma
• 6:30 - Doors open
• 6:45-7:00 - News with Hardeep Singh
• 7:00-7:30 - Three Keys for SecDevOps Success (Frank Kim)
• 7:35-8:05 - TLS for Microservices (Michael Cline)
• 8:05-9:00 - Networking
*Special Event* - November 2017 - Credit Karma
Hacker Thursdays: Learn secure coding with a live tournament
Stephen Allor
*Special Event* - October 2017 - ShieldX Networks
Hacker Thursdays:- Dissecting Injection vulnerabilities
Matt Torbin
September 2017 - Distil Networks
• 6:30 Doors Open
• 6:45 - 7:15 "The Great Bot Gift Card Heist" - Kevin Bottomley
• 7:20 - 7:50 "Scaling Application Security with DevSecOps" - Abhay Bhargav
• 7:55 - 8:25 "The Struts Vulnerability" - Prashant Venkatesh
• 8:25 - 9:00 Networking
• 9 Doors Close
September 2017 - Intuit
• 6:30 Doors Open
• 6:45 - 7:15 "Making Vulnerability Management Less Painful with OWASP DefectDojo" - Greg Anderson
• 7:20 - 7:50 "Crikey! Pirates Be Lurkin' at the Single Sign-On Watering Hole" - Mike Hunter
• 7:55 - 8:25 "There’s a new sheriff in town; dynamic security group recommendations with Grouper and Dredge" - Kevin Glisson
• 8:25 - 9:00 Networking
• 9 Doors Close
September 2017 - Lending Club
• 6:30 Doors Open
• 6:45 - 7:25 "Introducing the OWASP Game Security Framework" - Daniel Miessler
• 7:30 - 8:10 "Motherhood, Mental Health, and a Career in CyberSecurity" - Caroline Wong
• 8:10 - 9 Networking
• 9 Doors Close
*Special Event* - September 2017 - Lending Club
Web Application Penetration Basics
Ty Sbano
June 2017 - Lending Club
• 6:30 Doors Open
• 6:45 - 7:25 "Introducing the OWASP Game Security Framework" - Daniel Miessler
• 7:30 - 8:10 "Motherhood, Mental Health, and a Career in CyberSecurity" - Caroline Wong
• 8:10 - 9 Networking
• 9 Doors Close
May 2017 - Netflix (videos on youtube)
• 6:30 Doors Open
• 6:45 - 7:15 "All you email are belong to us: exploiting vulnerable email clients via domain name collision" - Ilya Nesterov and Maxim Goncharov
• 7:20 - 7:40 "Attacking & Defending DevOps" - Patrick Thomas
• 7:45 - 8:05 "LISA - Location Independent Security Approach" - Bryan Zimmer
• 8:05 - 9 Networking and Netflix OSS expo
• 9 Doors Close
April 2017 - Pandora (videos on youtube)
• 6:30 Doors Open
• 6:45 - 7:30 "Effective AppSec Metrics" - Caroline Wong
• 7:35 - 8:20 "IoT Exploitation 101" - Aditya Gupta
• 8:25 - 9:00 Networking
• 9:00 Doors Close
March 2017 (2) - Ebay
• 6:30 Doors Open
• 6:45 - 7:15 "Cracking Financial Systems" - John Menerick
• 7:20 - 7:50 "Hacking Mainframes" - Philip Young
• 7:55 - 8:25 "Hacking Smart Door Locks with Bluetooth Relay Attacks" - Mike Ryan
• 8:25 - 9 Networking
• 9 Doors Close
March 2017 - NetSpi
• 6:30 Doors Open
• 6:45 - 7:15 "Cracking Financial Systems" - John Menerick
• 7:20 - 7:50 "SQL Server Security" - Scott Sutherland
• 7:50 - 9 Networking
• 9 Doors Close
January 2017 (2) - Synack
• 6:30 Doors Open
• 6:45 - 7:30 Talk 1
Robert Wood - Bringing Red Teaming to the Board Room
• 7:45 - 8:30 Panel Discussions
• 8:30+ Networking
• 9 Doors Close
January 2017 - Bleacher Report
• 6:30 Doors Open
• 6:45 - 7:30 Talk 1
Robert Wood - Bringing Red Teaming to the Board Room
• 7:45 - 8:30 Talk 2
Rob Witoff - Security Automation With Immutable Infrastructure
• 8:30+ Networking
• 9 Doors Close
2016 Past Events
November (2) 2016 - Linkedin
• 6:30 Doors Open
• 6:45 - 7:30 Talk 1 (Rohit Pitke, Mukul Khullar - A walkthrough on AWS Security Pitfalls)
• 7:45 - 8:30 Talk 2 (Scott Behrens - Cleaning Your Applications' Dirty Laundry With Scumblr )
• 8:30+ Networking
November 2016 - Salesforce
• 6:30 Doors Open
• 6:45 - 7:30 Talk 1 -Will Bengston and Travis McPeak - Jumpstart a Bandit Program in Your Organization
• 7:45 - 8:30 Talk 2 - Kuba Sendor (@jsendor), Yelp - "Slicing Apples with Ninja Sword: Fighting Malware at the Corporate Level"
September 2016 - Twitter
• 6:30 Doors Open
• 6:45 - 7:30 Talk 1 - Ron Hamilton, Performance Technology Partners (PTP)
• 7:45 - 8:30 Talk 2 - Luca Carettoni, LinkedIn Defending against Java Deserialization Vulnerabilities
June 2016 - Visa
6:30 - Doors Open
6:45 - Talk 1 - Secure by Default Stack: Web Application Security Infrastructure - Pritam Mungse, Visa
7:30 - Break
7:40 - Talk 2 - Research on HTTPS error storage policies, Adrienne Porter Felt, Google
8:30 - Networking
May 2016 - Identity Access Managment
- Time : 09:00 AM
- Speakers : Sumit Ojha, Abhinav Sharma, Kajal Samant, Deepak Gupta
- Sumit Ojha ( Intro Session, Common Authentication Methods used for Network Security)
- Biometrics for Network Security.
- Token Authentication.
- Abhinav Sharma (Multi Factor Authentication)
- Deepak Gupta (Out of Band Authentication)
- Kajal Samant (Oauth vs SSO)
- Out-of-Band Authentication (OOB)
- e : ICS institute Gwalior
March 2016 - Identity Access Managment
- Time : 10:45 AM
- Speakers : Sumit Ojha, Krishna Gole,
- Sumit Ojha ( Intro Session, Authentication methods:- SSO, Two Factor Authentication, Kerberos )
- Krishna Gole (Biometrics)
- Venue : ICS institute Gwalior
Persistent Systems Limited Nagpur 440 022
- Agenda : Modern Web Application Vulnerabilities
2015 Past Events
OWASP Gwalior first chapter was held in Hotel Ambiance Gwalior in 29 October, 2015 - On "The rise of Digital Terrorism"