This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Minneapolis St Paul"

From OWASP
Jump to: navigation, search
Line 24: Line 24:
 
== OWASP-MSP Upcoming Chapter Meeting  ==
 
== OWASP-MSP Upcoming Chapter Meeting  ==
  
'''When:''' Tuesday, July 26th @ 6:00
+
'''When:''' Wednesday, August 24th @ 6:00
  
 
'''Where:'''  
 
'''Where:'''  
Best Buy Headquarters
+
Ewald Conference Center
7601 Penn Ave S, Richfield, MN
+
1000 Westgate Drive #252
 +
St. Paul, MN
  
'''Presentation:''' Software Security Metrics
+
'''Presentation:''' Practical Identity Access Managment: Lessons from the Field
  
'''Presenter:''' Caroline Wong
+
'''Presenter:''' John Benninghoff
  
 
'''Detail:'''  
 
'''Detail:'''  
  
Software Security Metrics: More often than not, company executives ask the wrong questions about software security. This session will discuss techniques for changing the conversation about software security in order to encourage executives to ask the right questions – and provide answers that show progress towards meaningful objectives. Caroline will discuss a progression of software security capabilities and the metrics that correspond to different levels of maturity. She’ll discuss an approach for developing key metrics for your unique software security program and walk through a detailed example.
+
Building Identity Access Management solutions can be difficult. This presentation reviews lessons learned from designing and building IAM solutions in multiple states, focusing on the unique challenges of IAM in government, which must serve the needs of three separate groups: the public, government agencies, and NGOs. Lessons drawn from real-world experiences will demonstrate what works, what doesn’t, and how to fix things when they go wrong.
  
Caroline Wong, CISSP, is the Director of Strategic Security Initiatives at Cigital, the world's largest consulting firm specializing in software security. Prior to this role, Caroline led a product management team at Symantec and security teams at Zynga and eBay. Caroline is the author of “Security Metrics: A Beginner’s Guide” and is well known as a thought leader on the topics of security strategy, operations, and metrics. She has been a featured speaker at industry conferences including RSA (USA and Europe), ITWeb Summit (South Africa), Metricon, the Executive Women's Forum, ISC2 and the Information Security Forum. Caroline contributed as a technical reviewer to the Center for Information Security Consensus Metrics Definitions. She graduated from U.C. Berkeley with a B.S. in Electrical Engineering and Computer Sciences, has a Certificate in Finance and Accounting from Stanford's Executive Education Program, and is CISSP certified. Caroline was awarded the 2010 Women of Influence "One to Watch" Award by the Executive Women's Forum.  
+
Following the flow of a typical user’s experience, the presentation will cover the successes, and failures of designing an IAM solution: getting a user ID, logging in to the system, matching “me” as a public user to “my data,” and getting access to the system. Along the way, we will explore lessons about how design choices for each step can impact that experience.
 +
 
 +
Also covered are designs that were not implemented, sharing the vision of how automated user-driven access requests, changes, and reviews can both improve user experience and lower costs.
 +
 
 +
Desired Learning Outcomes
 +
 
 +
This talk will include real-world lessons on:
 +
 
 +
• Selection of IAM products
 +
 
 +
• Why people might have 3 (or more) user IDs, and why that’s good
 +
 
 +
• Single Sign-On protocols, including SAML
 +
 
 +
• Why controlling usernames is so important, and how usernames can cause problems
 +
 
 +
• The critical differences between a “user” and a “person”
 +
 
 +
• What “identity matching” is and how it relates to IAM
 +
 
 +
• When and how to verify a user’s identity
 +
 
 +
• How IAM can be used to integrate multiple systems with separate authorization databases
 +
 
 +
• Managing the costs of public users
 +
 
 +
John Benninghoff has a diverse background in Information Security as an employee and consultant in financial services, retail, and government. John currently leads the Application Security program at a large healthcare company.
 +
 
 +
John began his information security career when he was asked to build and deploy a Network IDS using free software (SHADOW) after returning from a SANS conference in 1998. John has experience in security policy, program management, identity management, compliance, and application security, and speaks at national and regional security conferences on a variety of topics.
  
 
<!--
 
<!--
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
-->
 
-->
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-july-meeting-tickets-26422312849 Eventbrite Signup Link for Event]
+
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-august-2016-chapter-meeting-tickets-27002918456 Eventbrite Signup Link for Event]
  
 
<!--  
 
<!--  

Revision as of 15:40, 8 August 2016

OWASP Minneapolis-St. Paul (OWASP MSP)

Welcome to the Minneapolis-St. Paul (OWASP MSP) chapter homepage. The chapter leadership team includes Alex Bauert - President, Todd Dahl, and Lorna Alamri.

We use Meetup.com for announcements and sometimes, depending on the event Eventbrite.com for RSVP's to organize events and meetings. 


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG



Corporate Sponsors

      Advance it minnesota logo.png
      Best Buy logo.jpg
      FICO

OWASP-MSP Upcoming Chapter Meeting

When: Wednesday, August 24th @ 6:00

Where: Ewald Conference Center 1000 Westgate Drive #252 St. Paul, MN

Presentation: Practical Identity Access Managment: Lessons from the Field

Presenter: John Benninghoff

Detail:

Building Identity Access Management solutions can be difficult. This presentation reviews lessons learned from designing and building IAM solutions in multiple states, focusing on the unique challenges of IAM in government, which must serve the needs of three separate groups: the public, government agencies, and NGOs. Lessons drawn from real-world experiences will demonstrate what works, what doesn’t, and how to fix things when they go wrong.

Following the flow of a typical user’s experience, the presentation will cover the successes, and failures of designing an IAM solution: getting a user ID, logging in to the system, matching “me” as a public user to “my data,” and getting access to the system. Along the way, we will explore lessons about how design choices for each step can impact that experience.

Also covered are designs that were not implemented, sharing the vision of how automated user-driven access requests, changes, and reviews can both improve user experience and lower costs.

Desired Learning Outcomes

This talk will include real-world lessons on:

• Selection of IAM products

• Why people might have 3 (or more) user IDs, and why that’s good

• Single Sign-On protocols, including SAML

• Why controlling usernames is so important, and how usernames can cause problems

• The critical differences between a “user” and a “person”

• What “identity matching” is and how it relates to IAM

• When and how to verify a user’s identity

• How IAM can be used to integrate multiple systems with separate authorization databases

• Managing the costs of public users

John Benninghoff has a diverse background in Information Security as an employee and consultant in financial services, retail, and government. John currently leads the Application Security program at a large healthcare company.

John began his information security career when he was asked to build and deploy a Network IDS using free software (SHADOW) after returning from a SANS conference in 1998. John has experience in security policy, program management, identity management, compliance, and application security, and speaks at national and regional security conferences on a variety of topics.

REGISTRATION LINK: Eventbrite Signup Link for Event



Content

Igor Matlin - Warning: Security Storms are Brewing in Your JavaScript - OWASP (MSP) - May 2015


Secure360

Secure360 is an annual conference providing high quality educational sessions and networking opportunities while working to identify developing trends in risk management, physical security, governance, audit, information security, contingency planning and human capital.

DC612 Meetings

DC612 meets the 2nd Thursday of the month.
http://www.dc612.org/

President: Alex Bauert

Leadership Team: Todd Dahl

Leadership Team: Lorna Alamri

Board Oversight: David Bryan

Content and Social Media: [Eric]

Secure360 Representative: Alex Crittenden