This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Hartford"
(→Upcoming Events) |
|||
Line 5: | Line 5: | ||
== Sponsors == | == Sponsors == | ||
− | We would like to thank [http://www.ouncelabs.com/ Ounce Labs], [http://www.finjan.com/ Finjan], [http://www.forrester.com/ Forrester Research], | + | We would like to thank [http://www.ouncelabs.com/ Ounce Labs], [http://www.finjan.com/ Finjan], [http://www.forrester.com/ Forrester Research], |
− | + | [http://www.cigital.com/ Cigital], [http://www.accenture.com/ Accenture], [http://www.oracle.com/ Oracle], [http://www.the451group.com/ The 451 Group], | |
− | + | [http://www.ironkey.com/ IronKey], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and | |
− | + | helping make application security visible... | |
+ | |||
+ | If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:[email protected] James McGovern] with | ||
+ | |||
+ | your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees | ||
+ | |||
+ | and customers. | ||
+ | |||
+ | <paypal>Hartford</paypal><br> | ||
+ | |||
+ | == November 11th 2008 == | ||
+ | To add this event to your Outlook calendar, click [http://outlook.calendar.com/OWASPHartfordNov2008.ics here]<br> | ||
+ | <paypal>Hartford</paypal><br> | ||
Food and Beverages for this event are sponsored by: [http://www.voltage.com/ Voltage Security]<br> | Food and Beverages for this event are sponsored by: [http://www.voltage.com/ Voltage Security]<br> | ||
+ | |||
OPENING REMARKS: 5:00 - 5:15 PM<br> | OPENING REMARKS: 5:00 - 5:15 PM<br> | ||
James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br> | James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br> | ||
<br> | <br> | ||
− | + | PRIVACY CONSIDERATIONS FOR WEBSITES: 5:15 - 6:00 PM<br> | |
− | + | Matthew Barach, [http://www.linkedin.com/pub/4/22a/a52 Boston Privacy Group]<br> | |
<br> | <br> | ||
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br> | LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br> | ||
Line 24: | Line 37: | ||
<br> | <br> | ||
− | <b> | + | <b>Matthew Barach, ESQ</b><br> |
− | + | Expert in information privacy including concepts and applications of U.S. and international privacy laws and information management practices as well as | |
− | + | ||
− | + | the privacy implications of emerging technologies. Expertise in HIPAA, COPPA, GLBA, APEC principles, OECD guidelines, EU Directive, employee records | |
+ | |||
+ | management, workplace monitoring, contingency planning, incident handling, PII, Web forms, cookie files, Spyware, spam and other KEY information privacy | ||
+ | |||
+ | items. Matthew is Internet and Information Privacy Counsel at New York Consumer PRotection Board. | ||
+ | |||
<b>Terence Spies</b><br> | <b>Terence Spies</b><br> | ||
− | Terence Spies has over 14 years of security and systems software development experience, working with leading companies such as Microsoft, Asta Networks and others. Terence now serves as Chief Technology Officer, overseeing the expansion of Voltage IBE technology into new application areas such as mobility, data storage and other areas where application data security is required.<br><br> | + | Terence Spies has over 14 years of security and systems software development experience, working with leading companies such as Microsoft, Asta Networks |
+ | |||
+ | and others. Terence now serves as Chief Technology Officer, overseeing the expansion of Voltage IBE technology into new application areas such as | ||
+ | |||
+ | mobility, data storage and other areas where application data security is required.<br><br> | ||
<u>Identity-Based Encryption</u><br> | <u>Identity-Based Encryption</u><br> | ||
Identity-Based Encryption (IBE) is a new type of public key encryption that can use Identities such as Device Identifiers as | Identity-Based Encryption (IBE) is a new type of public key encryption that can use Identities such as Device Identifiers as | ||
Line 36: | Line 58: | ||
overview of the technology, current standardization through IEEE and possible applications will be presented. | overview of the technology, current standardization through IEEE and possible applications will be presented. | ||
− | |||
− | ' | + | == February 10th 2009 == |
+ | To add this event to your Outlook calendar, click [http://outlook.calendar.com/OWASPHartfordFeb2009.ics here]<br> | ||
+ | <paypal>Hartford</paypal><br> | ||
+ | Food and Beverages for this event are sponsored by: [http://www.sun.com/ Sun Microsystems]<br> | ||
+ | |||
+ | |||
+ | OPENING REMARKS: 5:00 - 5:15 PM<br> | ||
+ | James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br> | ||
+ | <br> | ||
+ | OPEN SOURCE IDENTITY SERVICES (The Higgins Project): 5:15 - 6:00 PM<br> | ||
+ | Mary Ruddy, [http://www.meristic.com/index.php Meristic]<br> | ||
+ | <br> | ||
+ | Core Security Patterns: 6:00 - 7:00 PM<br> | ||
+ | Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]<br> | ||
+ | <br> | ||
+ | |||
+ | |||
+ | <b>Mary Ruddy</b><br> | ||
+ | Mary is the founder of Meristic. Mary founded and co-leads the Higgins open source identity framework project, is a founding Board Member of the | ||
+ | |||
+ | Information Card Foundation and Chief Steward of Identity Commons. he MIT Sloan School of Management. <br><br> | ||
+ | <u>Open Source Identity Services</u><br> | ||
+ | The Higgins Project is developing an extensible, platform-independent, identity protocol-independent, software framework to support existing and new | ||
+ | |||
+ | applications. Its goal is to improve interoperability, privacy, and security as well as empower users with more control over their personal information. | ||
+ | |||
+ | This presentation demoed interoperability between Microsoft's CardSpace and Liberty-based products, all in an Open Source environment. <br><br> | ||
+ | <b>Ramesh Nagappan</b><br> | ||
+ | Ramesh Nagappan is a Java Technology Architect at Sun Microsystems. With extensive industry experience, he specializes in Java distributed computing and | ||
+ | |||
+ | security architectures for mission-critical applications. Previously he coauthored three best-selling books on J2EE, EAI, and Web Services. He is an | ||
+ | |||
+ | active contributor to open source applications and industry-standard initiatives, and frequently speaks at industry conferences related to Java, XML, and | ||
+ | |||
+ | Security.</u><br> | ||
+ | Core Security Patterns describe how to build robust end-to-end security into enterprise applications, web services, identity management systems and | ||
+ | |||
+ | service provisioning systems. The primary focus of this presentation is to introduce a security design methodology using a proven set of reusable design | ||
+ | |||
+ | patterns, best practices, reality checks, defensive strategies and assessment checklists that can be applied to enterprise applications. | ||
+ | |||
− | RECRUITING ELITE IT TALENT: | + | == March 9th 2009 == |
+ | To add this event to your Outlook calendar, click [http://outlook.calendar.com/OWASPHartfordMar2009.ics here]<br> | ||
+ | <paypal>Hartford</paypal><br> | ||
+ | Food and Beverages for this event are sponsored by: [http://www.emc.com/ The RSA division of EMC]<br> | ||
+ | |||
+ | |||
+ | OPENING REMARKS: 5:00 - 5:15 PM<br> | ||
+ | James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br> | ||
+ | <br> | ||
+ | RECRUITING ELITE IT TALENT: 5:15 - 6:00 PM<br> | ||
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br> | Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br> | ||
<br> | <br> | ||
− | FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: | + | CASE STUDY: Rolling out a secure SDLC in a large enterprise: 6:00 - 7:00 PM<br> |
+ | Nehrav Mehta, Security Architect at [http://www.emc.com/ EMC]<br> | ||
+ | <br> | ||
+ | |||
+ | |||
+ | '''JORDAN HABERFIELD''' | ||
+ | |||
+ | System One provides technical outsourcing solutions to clients in the energy, engineering, information technology and scientific sectors. Combining | ||
+ | |||
+ | national recruiting capabilities and local market expertise, we are the go-to, single source firm for clients looking to attract, select and retain a | ||
+ | |||
+ | quality workforce. | ||
+ | |||
+ | System One advises clients on recruiting strategy and organizational effectiveness. We also help skilled professionals advance their careers. The result — | ||
+ | |||
+ | carefully-matched hires, well-executed projects, and effective resource management. | ||
+ | |||
+ | |||
+ | == OWASP AppSec Executive Summit (May 2009) == | ||
+ | <paypal>Hartford</paypal><br> | ||
+ | Please visit our sponsors session, if you are interested in having a booth at this event<br> | ||
+ | |||
+ | <br> | ||
+ | FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 1:00 - 1:45 PM<br> | ||
+ | Mary Ann Davidson, CISO of [http://www.oracle.com/ Oracle]<br> | ||
+ | <br> | ||
+ | OFFSHORING APPLICATION DEVELOPMENT: SECURITY IS STILL YOUR PROBLEM: 1:45 - 2:30 PM<br> | ||
+ | Rohyt Belani, [http://www.intrepidusgroup.com/ Intrepridus Group]<br> | ||
+ | <br> | ||
+ | The STATE OF SOFTWARE DEVELOPMENT: 2:45 - 3:30 PM<br> | ||
+ | Grady Booch, Fellow at [http://www.ibm.com/ IBM]<br> | ||
+ | <br> | ||
+ | FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 3:30 - 4:15 PM<br> | ||
Rohit Sethi, [http://www.securitycompass.com/ Security Compass]<br> | Rohit Sethi, [http://www.securitycompass.com/ Security Compass]<br> | ||
<br> | <br> | ||
− | |||
− | |||
<br> | <br> | ||
+ | |||
+ | '''MARY ANN DAVIDSON''' | ||
+ | Mary Ann Davidson is the Chief Security Officer at Oracle Corporation, responsible for Oracle product security, as well as security evaluations, | ||
+ | |||
+ | assessments and incident handling. She represents Oracle on the Board of Directors of the Information Technology Information Security Analysis Center (IT | ||
+ | |||
+ | -ISAC) | ||
+ | |||
+ | '''Rohyt Belani''' | ||
+ | Rohyt Belani is a Managing Partner and co-founder of the Intrepidus Group. Prior to founding the Intrepidus Group, Rohyt started and ran Mandiant’s New | ||
+ | |||
+ | York City operations. During the last 7 years, he has worked at premier information security organizations like Foundstone and the US-CERT. | ||
+ | Rohyt is a regular speaker at various industry conferences, including Black Hat, OWASP, Hack-In-The-Box, InfoSec World, and several forums catering to the | ||
+ | |||
+ | FBI and US Secret Service agents. He currently teaches a class at Carnegie Mellon University, and has been invited to guest lecture at the University of | ||
+ | |||
+ | Wisconsin on the topic of information security. | ||
+ | |||
+ | '''Grady Booch''' | ||
+ | Grady Booch is recognized internationally for his innovative work on software architecture, modeling, and software | ||
+ | engineering process. His work has improved the effectiveness of software developers worldwide. He has been with | ||
+ | Rational Software Corporation as Chief Scientist since its founding in 1980. Grady is one of the original developers | ||
+ | of the Unified Modeling Language (UML) and was also one of the original developers of several of Ra tional's products | ||
+ | including Rational Rose. Grady has served as architect and architectural mentor for numerous complex software systems | ||
+ | around the world. | ||
+ | |||
'''ROHIT SETHI''' | '''ROHIT SETHI''' | ||
− | Rohit Sethi, Manager of Professional Services, Security Compass, is a specialist in threat modeling, application security reviews, and building security | + | Rohit Sethi, Manager of Professional Services, Security Compass, is a specialist in threat modeling, application security reviews, and building security |
− | At Security Compass, Rohit teaches students various topics on web application security in cities across North America. He has also managed and performed extensive threat analysis, source code reviews, and penetration testing for clients in financial services, utilities, telecommunications and healthcare. He is often consulted for his dual expertise in information security and software engineering. | + | controls into the software development life cycle (SDLC). Mr. Sethi is a frequent guest speaker and instructor at several conferences, including RSA, |
+ | |||
+ | Shmoocon, and CSI. He has written articles for Security Focus and the Web Application Security Consortium (WASC), and has been quoted as an expert in | ||
+ | |||
+ | application security for ITWorldCanada and Computer World. | ||
+ | |||
+ | At Security Compass, Rohit teaches students various topics on web application security in cities across North America. He has also managed and performed | ||
+ | |||
+ | extensive threat analysis, source code reviews, and penetration testing for clients in financial services, utilities, telecommunications and healthcare. | ||
+ | |||
+ | He is often consulted for his dual expertise in information security and software engineering. | ||
− | |||
− | + | == UPCOMING 2009 EVENTS == | |
+ | <paypal>Hartford</paypal><br> | ||
− | + | '''April 2009''' | |
+ | IBM - Rational (Static Analysis) | ||
+ | '''June 2009''' | ||
+ | Kent Browne of IBM | ||
+ | Gerald Beuchelt of Sun | ||
− | |||
− | + | == WEB CONFERENCING INFORMATION == | |
+ | We are pleased to present all OWASP meetings via conference call. To listen, the dialin number is 1-218-936-4700 (Passcode 606183). The conference line has a limited number of caller slots, so please be considerate of others and share whenever possible. | ||
== Call for Speakers == | == Call for Speakers == |
Revision as of 20:05, 19 October 2008
OWASP Hartford
Welcome to the Hartford chapter homepage. The chapter leader is James McGovern
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
<paypal>Hartford</paypal>
Sponsors
We would like to thank Ounce Labs, Finjan, Forrester Research,
Cigital, Accenture, Oracle, The 451 Group,
IronKey, The Hartford and Microsoft for their generous sponsorship and
helping make application security visible...
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email James McGovern with
your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees
and customers.
<paypal>Hartford</paypal>
November 11th 2008
To add this event to your Outlook calendar, click here
<paypal>Hartford</paypal>
Food and Beverages for this event are sponsored by: Voltage Security
OPENING REMARKS: 5:00 - 5:15 PM
James McGovern, OWASP Hartford Chapter Leader
PRIVACY CONSIDERATIONS FOR WEBSITES: 5:15 - 6:00 PM
Matthew Barach, Boston Privacy Group
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM
Terence Spies, CTO of Voltage Security
Matthew Barach, ESQ
Expert in information privacy including concepts and applications of U.S. and international privacy laws and information management practices as well as
the privacy implications of emerging technologies. Expertise in HIPAA, COPPA, GLBA, APEC principles, OECD guidelines, EU Directive, employee records
management, workplace monitoring, contingency planning, incident handling, PII, Web forms, cookie files, Spyware, spam and other KEY information privacy
items. Matthew is Internet and Information Privacy Counsel at New York Consumer PRotection Board.
Terence Spies
Terence Spies has over 14 years of security and systems software development experience, working with leading companies such as Microsoft, Asta Networks
and others. Terence now serves as Chief Technology Officer, overseeing the expansion of Voltage IBE technology into new application areas such as
mobility, data storage and other areas where application data security is required.
Identity-Based Encryption
Identity-Based Encryption (IBE) is a new type of public key encryption that can use Identities such as Device Identifiers as
public keys. Originally proposed in 1984, only recently practical implementations became available. IBE allows to build secure
protocols with minimum overhead, while at the same time being highly scalable and easy to implement. In this session an
overview of the technology, current standardization through IEEE and possible applications will be presented.
February 10th 2009
To add this event to your Outlook calendar, click here
<paypal>Hartford</paypal>
Food and Beverages for this event are sponsored by: Sun Microsystems
OPENING REMARKS: 5:00 - 5:15 PM
James McGovern, OWASP Hartford Chapter Leader
OPEN SOURCE IDENTITY SERVICES (The Higgins Project): 5:15 - 6:00 PM
Mary Ruddy, Meristic
Core Security Patterns: 6:00 - 7:00 PM
Ramesh Nagappan, Security Architect at Sun Microsystems
Mary Ruddy
Mary is the founder of Meristic. Mary founded and co-leads the Higgins open source identity framework project, is a founding Board Member of the
Information Card Foundation and Chief Steward of Identity Commons. he MIT Sloan School of Management.
Open Source Identity Services
The Higgins Project is developing an extensible, platform-independent, identity protocol-independent, software framework to support existing and new
applications. Its goal is to improve interoperability, privacy, and security as well as empower users with more control over their personal information.
This presentation demoed interoperability between Microsoft's CardSpace and Liberty-based products, all in an Open Source environment.
Ramesh Nagappan
Ramesh Nagappan is a Java Technology Architect at Sun Microsystems. With extensive industry experience, he specializes in Java distributed computing and
security architectures for mission-critical applications. Previously he coauthored three best-selling books on J2EE, EAI, and Web Services. He is an
active contributor to open source applications and industry-standard initiatives, and frequently speaks at industry conferences related to Java, XML, and
Security.</u>
Core Security Patterns describe how to build robust end-to-end security into enterprise applications, web services, identity management systems and
service provisioning systems. The primary focus of this presentation is to introduce a security design methodology using a proven set of reusable design
patterns, best practices, reality checks, defensive strategies and assessment checklists that can be applied to enterprise applications.
March 9th 2009
To add this event to your Outlook calendar, click here
<paypal>Hartford</paypal>
Food and Beverages for this event are sponsored by: The RSA division of EMC
OPENING REMARKS: 5:00 - 5:15 PM
James McGovern, OWASP Hartford Chapter Leader
RECRUITING ELITE IT TALENT: 5:15 - 6:00 PM
Jordan Haberfield (Agile Elephant), SVP of System One
CASE STUDY: Rolling out a secure SDLC in a large enterprise: 6:00 - 7:00 PM
Nehrav Mehta, Security Architect at EMC
JORDAN HABERFIELD
System One provides technical outsourcing solutions to clients in the energy, engineering, information technology and scientific sectors. Combining
national recruiting capabilities and local market expertise, we are the go-to, single source firm for clients looking to attract, select and retain a
quality workforce.
System One advises clients on recruiting strategy and organizational effectiveness. We also help skilled professionals advance their careers. The result —
carefully-matched hires, well-executed projects, and effective resource management.
OWASP AppSec Executive Summit (May 2009)
<paypal>Hartford</paypal>
Please visit our sponsors session, if you are interested in having a booth at this event
FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 1:00 - 1:45 PM
Mary Ann Davidson, CISO of Oracle
OFFSHORING APPLICATION DEVELOPMENT: SECURITY IS STILL YOUR PROBLEM: 1:45 - 2:30 PM
Rohyt Belani, Intrepridus Group
The STATE OF SOFTWARE DEVELOPMENT: 2:45 - 3:30 PM
Grady Booch, Fellow at IBM
FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 3:30 - 4:15 PM
Rohit Sethi, Security Compass
MARY ANN DAVIDSON Mary Ann Davidson is the Chief Security Officer at Oracle Corporation, responsible for Oracle product security, as well as security evaluations,
assessments and incident handling. She represents Oracle on the Board of Directors of the Information Technology Information Security Analysis Center (IT
-ISAC)
Rohyt Belani Rohyt Belani is a Managing Partner and co-founder of the Intrepidus Group. Prior to founding the Intrepidus Group, Rohyt started and ran Mandiant’s New
York City operations. During the last 7 years, he has worked at premier information security organizations like Foundstone and the US-CERT. Rohyt is a regular speaker at various industry conferences, including Black Hat, OWASP, Hack-In-The-Box, InfoSec World, and several forums catering to the
FBI and US Secret Service agents. He currently teaches a class at Carnegie Mellon University, and has been invited to guest lecture at the University of
Wisconsin on the topic of information security.
Grady Booch Grady Booch is recognized internationally for his innovative work on software architecture, modeling, and software engineering process. His work has improved the effectiveness of software developers worldwide. He has been with Rational Software Corporation as Chief Scientist since its founding in 1980. Grady is one of the original developers of the Unified Modeling Language (UML) and was also one of the original developers of several of Ra tional's products including Rational Rose. Grady has served as architect and architectural mentor for numerous complex software systems around the world.
ROHIT SETHI
Rohit Sethi, Manager of Professional Services, Security Compass, is a specialist in threat modeling, application security reviews, and building security
controls into the software development life cycle (SDLC). Mr. Sethi is a frequent guest speaker and instructor at several conferences, including RSA,
Shmoocon, and CSI. He has written articles for Security Focus and the Web Application Security Consortium (WASC), and has been quoted as an expert in
application security for ITWorldCanada and Computer World.
At Security Compass, Rohit teaches students various topics on web application security in cities across North America. He has also managed and performed
extensive threat analysis, source code reviews, and penetration testing for clients in financial services, utilities, telecommunications and healthcare.
He is often consulted for his dual expertise in information security and software engineering.
UPCOMING 2009 EVENTS
<paypal>Hartford</paypal>
April 2009 IBM - Rational (Static Analysis)
June 2009 Kent Browne of IBM Gerald Beuchelt of Sun
WEB CONFERENCING INFORMATION
We are pleased to present all OWASP meetings via conference call. To listen, the dialin number is 1-218-936-4700 (Passcode 606183). The conference line has a limited number of caller slots, so please be considerate of others and share whenever possible.
Call for Speakers
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.
Some topics of interest for upcoming meetings include (but are not limited to):
- Breaking CAPTCHA
- Hacking Cardspace and Identity 2.0
- Breaking Commercial Software for Fun and Profit
- Tactics for breaking software licensing schemes
- Gaming, the next overlooked security hole
- Hacking Mainframes
- Database rootkits
Past Events
Agenda: Wednesday, September 24th 2008
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM Paul Roberts, Industry Analyst, The 451 Group Powerpoint presentation is located here
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM Andrew Stone, Senior Manager, Accenture Powerpoint presentation is located here
Agenda: Wednesday, June 11th 2008
CARDSPACE AND USER CENTRIC IDENTITY Chris Winn, Security Evangelist, Microsoft
IDENTITY GOVERNANCE FRAMEWORK Prateek Mishra, Product Manager, Oracle Powerpoint Presentation is here
Agenda: Wednesday, April 30th 2008
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES Anton Chuvakin, Chief Logging Evangelist, LogLogic
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE Jack Danahy, CTO and Founder, Ounce Labs
Agenda: Thursday, February 28th 2008
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY Chenxi Wang, Principal Analyst, Forrester Research
EXPLOITING ONLINE GAMES Gary McGraw, CTO, Cigital
Locations
All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.