This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Israel"
(→Chapter meetings) |
|||
Line 1: | Line 1: | ||
{{Chapter Template|chaptername=Israel|extra=The chapter leader is [mailto:[email protected] Ofer Shezaf]|mailinglistsite=http://lists.sourceforge.net/lists/listinfo/owasp-israel/}} | {{Chapter Template|chaptername=Israel|extra=The chapter leader is [mailto:[email protected] Ofer Shezaf]|mailinglistsite=http://lists.sourceforge.net/lists/listinfo/owasp-israel/}} | ||
− | == | + | == OWASP IL meeting, Wednesday, July 26th == |
+ | '''At [[http://www.breach.com Breach Security]] offices in Herzeliya''' | ||
− | + | <big>'''17:15 - Gathering, Socializing and Pizzas'''</big> | |
− | -- | + | |
+ | <big>'''17:30 - Exposing cryptography for software developers'''</big> | ||
+ | '''Shai Zalalichin, Head of AppSec group, Comsec''' | ||
+ | |||
+ | Encryption is a very important tool in the application security tool chest, but is also a very complex technology. The presentation will explore common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications. | ||
+ | |||
+ | The presentation was originally given at OWASP Europe conference in May. | ||
+ | |||
+ | <big>'''18:30 - Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography'''<big> | ||
+ | '''Prof. Amir Herzberg, dept. of computer science, Bar-Ilan University, Israel''' | ||
+ | |||
+ | Spoofing, Phishing and spamming are of the worst security problems in the Internet. Amir will present vulnerabilities in the current email and web systems, causing the proliferation of such attacks. Amir will then discuss some recent proposals made by him as well as others to improve security against these threats. Some solutions involve secure usability, | ||
+ | some use (simple) cryptographic protocols, while others involve both areas. | ||
+ | |||
+ | <big>'''19:20 - Questions & Feedback'''</big> |
Revision as of 19:01, 17 July 2006
OWASP Israel
Welcome to the Israel chapter homepage. The chapter leader is Ofer Shezaf
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
OWASP IL meeting, Wednesday, July 26th
At [Breach Security] offices in Herzeliya
17:15 - Gathering, Socializing and Pizzas
17:30 - Exposing cryptography for software developers
Shai Zalalichin, Head of AppSec group, Comsec
Encryption is a very important tool in the application security tool chest, but is also a very complex technology. The presentation will explore common pitfalls & countermeasures that every developer should follow when writing crypto-aware applications.
The presentation was originally given at OWASP Europe conference in May.
18:30 - Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography Prof. Amir Herzberg, dept. of computer science, Bar-Ilan University, Israel
Spoofing, Phishing and spamming are of the worst security problems in the Internet. Amir will present vulnerabilities in the current email and web systems, causing the proliferation of such attacks. Amir will then discuss some recent proposals made by him as well as others to improve security against these threats. Some solutions involve secure usability, some use (simple) cryptographic protocols, while others involve both areas.
19:20 - Questions & Feedback