This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Israel"

From OWASP
Jump to: navigation, search
(OWASP IL mini conference at IDC, November 13th 2006)
(OWASP IL mini conference at IDC, November 13th 2006)
Line 58: Line 58:
 
== OWASP IL mini conference at IDC, November 13th 2006 ==
 
== OWASP IL mini conference at IDC, November 13th 2006 ==
  
OWASP IL and the Interdisciplinary Center Herzliya (IDC) held a half day conference on application security on Nov 13th 2006. The event marked the establishment of a new academic program on information security in the net era at IDC's Efi Arazi School of Computer Science. More than 90! people attended the conference, enjoyed professional catering and heard no less than 7 presentations.
+
OWASP IL and the Interdisciplinary Center Herzliya (IDC) held a half day conference on application security on Nov 13th 2006. The event marked the establishment of a new academic program on information security in the net era at IDC's Efi Arazi School of Computer Science. More than 90! people attended the conference, enjoyed professional catering and heard no less than 7 presentations. [[Image:OWASP_IL_IDC.jpg|right]]
  
 
'''[http://www.owasp.org/index.php/1nd_OWASP_IL_mini_conference Conference program and presentations download]'''
 
'''[http://www.owasp.org/index.php/1nd_OWASP_IL_mini_conference Conference program and presentations download]'''

Revision as of 06:38, 20 August 2007

OWASP Israel

Welcome to the Israel chapter homepage. The chapter leader is Ofer Shezaf


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Next Meeting: September 5th, at Watchfire, Herzeliya

Save the day! 5/9, 17:00

OWASP IL Sponsor Watchfire.jpg
The next meeting of OWASP Israel will be held on September 5th at 17:00. This time Watchfire will host and sponsor the meeting. But don't rush to bring a map: it is the building adjacent to Breach in Herzeliya. Thanks to Ory Segal from Watchfire for organizing that.

The event will be part of the global security week (September 3rd-9th: http://www.globalsecurityweek.com/). In this OWASP holds mini conference and chapter meetings around the world and so will we.


Call for presenters

If you would like to present in the meeting, please send me ([email protected]) details of the presentation.

2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya, May 21th 2007

The 2nd OWASP IL mini conference was herd at the Interdisciplinary Center (IDC) Herzliya on May 21th 2007. The event was a huge success with over a 150 people attending and 8 companies and organizations sponsoring the event. The feedback for the carefully selected presentations presentations, all of them relevant, informative and most importantly none commercial was great.

Conference program and presentations download

Pictures from the conference

The meeting was sponsored by Breach Security, Checkpoint, Hacktics, Microsoft, Zend, 2Bsecure, F5 Networks and the Efi Arazi school of Computer Science at the Interdisciplinary Center (IDC) Herzliya.

Breach logo.gif    OWASP IL Sponsor Hacktics.jpgOWASP IL Sponsor Zend.jpg    OWASP IL Sponsor 2B.jpg    OWASP IL Sponsor F5.jpg

OWASP IL Sponsor Checkpoint.gif    OWASP IL Sponsor Microsoft.gif    OWASP IL Sponsor IDC.jpg

6th OWASP IL meeting, January 24th 2007

The 6th OWASP IL meeting was held on January 24th 2007, at 17:15, at Breach Security offices in Herzelya and was sponsored by Breach Security. The meeting was very successful, with nearly 50 people attending the meeting.

The agenda of the meeting was:


Source Code Analysis and Application Security - Cheating the Maze

Maty Siman, Founder & CTO, Checkmarx

During the last few years automatically analyzing source code in order to find security vulnerabilities became a popular method in the field of Application Security. The presentation will discuss the theory and research of static code analysis, the application of static code analysis for security, comparing this method to other application security defense technologies and will demonstrate the use of static code analysis for application security.


Security Implications of .Net 3.0 and the Windows Communication Foundation (WCF)

Emmanuel Cohen-Yashar (Manu), Senior .NET technology consultant, Sela Group

Windows Communication Foundation (WCF) is the new Microsoft communication framework bundled as part of of .NET Framework 3.0, the new .NET Windows API succeeding Win32 with the release of Windows Vista. WCF programming model unifies Web Services, .NET Remoting, Distributed Transactions, and Message Queues into a single Service-oriented programming model for distributed computing. The presentation will describe the tenets of SOA – Service Oriented Architecture, introduce WCF and discuss the security implications of this broad new communication paradigm.


Analysis of the Universal XSS PDF vulnerability - Cause, Solutions and Fun Stuff

Ofer Shezaf, CTO, Breach Security, Leader of ModSecurity Core Rule Set open source project

Recently a new vulnerability was discovered in commonly used versions of Adobe Acrobat software. Unlike common XSS attacks that require a specific vulnerability in the attacked web site, in this case the vulnerability in Acrobat is sufficient and no fault is required in the attacked web site, and any site that serves PDF files is vulnerable. Therefore it is called "universal XSS" vulnerability.

The presentation will describe the vulnerability, the theoretical and practical solutions for the vulnerability as well as some very funny stories about the dynamics of such a high profile vulnerability, or in other words, what happens when you try to get a car mechanic to fix an application security vulnerability.

OWASP IL mini conference at IDC, November 13th 2006

OWASP IL and the Interdisciplinary Center Herzliya (IDC) held a half day conference on application security on Nov 13th 2006. The event marked the establishment of a new academic program on information security in the net era at IDC's Efi Arazi School of Computer Science. More than 90! people attended the conference, enjoyed professional catering and heard no less than 7 presentations.
OWASP IL IDC.jpg

Conference program and presentations download

The meeting was sponsored by Breach Security and Applicure Technologies.

Breach logo.gif   File:Applicure logo.JPG

4th OWASP IL meeting, July 26th 2006

The 4th OWASP IL meeting was held on July 26th 2006 at Breach Security offices with the following presentations:

Exposing cryptography for software developers

Shai Zalalichin, Head of AppSec group, Comsec

Encryption is a very important tool in the application security tool chest, but is also a very complex technology. The presentation will explore common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications.

The presentation was originally given at OWASP Europe conference in May.

Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography

Prof. Amir Herzberg, dept. of computer science, Bar-Ilan University, Israel

Spoofing, Phishing and spamming are of the worst security problems in the Internet. Amir will present vulnerabilities in the current email and web systems, causing the proliferation of such attacks. Amir will then discuss some recent proposals made by him as well as others to improve security against these threats. Some solutions involve secure usability,

some use (simple) cryptographic protocols, while others involve both areas.