This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Houston"

From OWASP
Jump to: navigation, search
m
Line 34: Line 34:
 
<ul>
 
<ul>
 
<li>'''August 8, 2007:  Speaker TBD<br>[http://www.f5.com/ F5 Application Security]''' <br><br></li>
 
<li>'''August 8, 2007:  Speaker TBD<br>[http://www.f5.com/ F5 Application Security]''' <br><br></li>
<li>'''September 12, 2007:  Speaker TBD<br>[http://www.fortifysoftware.com/ Fortify Software]'''<br><br></li>
+
<li>'''September 12, 2007:  Troy Stewart<br>[http://www.fortifysoftware.com/ Fortify Software]'''<br><br></li>
 
<li>'''October 10, 2007:  Top 10 Website Attack Techniques'''<br>Jeremiah Grossman, Founder/CTO of [http://www.whitehatsec.com/home/index.html WhiteHat Security]<br><br></li>
 
<li>'''October 10, 2007:  Top 10 Website Attack Techniques'''<br>Jeremiah Grossman, Founder/CTO of [http://www.whitehatsec.com/home/index.html WhiteHat Security]<br><br></li>
 
<li>'''November 14, 2007:  Threat Modeling: A Secure Development Tool for Security Professionals'''<br>John Dickson, [http://denimgroup.com/ Denim Group]<br><br> </li>
 
<li>'''November 14, 2007:  Threat Modeling: A Secure Development Tool for Security Professionals'''<br>John Dickson, [http://denimgroup.com/ Denim Group]<br><br> </li>

Revision as of 19:34, 20 July 2007

Welcome to OWASP Houston
the free and open application security community


Welcome to Houston Chapter


The Houston Chapter will focus around Web Application Security issues with discussions on application layer vulnerabilties, penetration testing, and secure coding practices within the numerous development languages. Our chapter will meet on the second (2nd) Wednesday of each month and participation in OWASP Houston is free and open to all.

Please subscribe to the mailing list for meeting announcements. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics. If you would like to make a presentation, or have any questions about the Houston Chapter, send an email to David Nester.


  • August 8, 2007: Speaker TBD
    F5 Application Security


  • September 12, 2007: Troy Stewart
    Fortify Software


  • October 10, 2007: Top 10 Website Attack Techniques
    Jeremiah Grossman, Founder/CTO of WhiteHat Security

  • November 14, 2007: Threat Modeling: A Secure Development Tool for Security Professionals
    John Dickson, Denim Group

  • December 12, 2007: Speaker TBD
    Atrysk Security



Chapter Meeting :: August 8, 2007: F5 Application Security


Time:

  • 5:30-6:15 Reception and Networking
  • 6:15-6:30 Welcome and Announcements
  • 6:30-7:30 Presentation


Presentation

  • TBD


Bio

  • TBD


Location
Microsoft Campus
One Briar Lake Plaza
2000 W. Sam Houston Pkwy. S. #350
Houston, TX 77042
Phone: (832) 252-4300
Microsoft (MAP)

Geek Food will be provided


Meeting Sponsors




Past Presentations

  • June 5, 2007 :: Web 2.0 Presentation Download

    Presentation by Dan Cornell of the Denim Group. With the integration of new technologies into web application development, there are more security dangers than ever before to be found in the application layer. This session discusses the landscape of web application security, new technologies being used in developing web applications and web services and the implications these have on system security. Technical vulnerabilities in web applications such as SQL injection and cross-site scripting (XSS) will be discussed alongside logical, business-level issues. The evolution of these flaws will be tracked as traditional web applications have expanded to include Web 2.0, AJAX and web services capabilities. The goal of the presentation is to educate developers, project managers and quality assurance personnel about the risks inherent in developing web applications and provide meaningful recommendations for addressing those risks during the software development lifecycle.