This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Minneapolis St Paul

Revision as of 15:40, 8 August 2016 by Todd.dahl (talk | contribs)

Jump to: navigation, search

OWASP Minneapolis-St. Paul (OWASP MSP)

Welcome to the Minneapolis-St. Paul (OWASP MSP) chapter homepage. The chapter leadership team includes Alex Bauert - President, Todd Dahl, and Lorna Alamri.

We use for announcements and sometimes, depending on the event for RSVP's to organize events and meetings. 


OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.


Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Corporate Sponsors

      Advance it minnesota logo.png
      Best Buy logo.jpg

OWASP-MSP Upcoming Chapter Meeting

When: Wednesday, August 24th @ 6:00

Where: Ewald Conference Center 1000 Westgate Drive #252 St. Paul, MN

Presentation: Practical Identity Access Managment: Lessons from the Field

Presenter: John Benninghoff


Building Identity Access Management solutions can be difficult. This presentation reviews lessons learned from designing and building IAM solutions in multiple states, focusing on the unique challenges of IAM in government, which must serve the needs of three separate groups: the public, government agencies, and NGOs. Lessons drawn from real-world experiences will demonstrate what works, what doesn’t, and how to fix things when they go wrong.

Following the flow of a typical user’s experience, the presentation will cover the successes, and failures of designing an IAM solution: getting a user ID, logging in to the system, matching “me” as a public user to “my data,” and getting access to the system. Along the way, we will explore lessons about how design choices for each step can impact that experience.

Also covered are designs that were not implemented, sharing the vision of how automated user-driven access requests, changes, and reviews can both improve user experience and lower costs.

Desired Learning Outcomes

This talk will include real-world lessons on:

• Selection of IAM products

• Why people might have 3 (or more) user IDs, and why that’s good

• Single Sign-On protocols, including SAML

• Why controlling usernames is so important, and how usernames can cause problems

• The critical differences between a “user” and a “person”

• What “identity matching” is and how it relates to IAM

• When and how to verify a user’s identity

• How IAM can be used to integrate multiple systems with separate authorization databases

• Managing the costs of public users

John Benninghoff has a diverse background in Information Security as an employee and consultant in financial services, retail, and government. John currently leads the Application Security program at a large healthcare company.

John began his information security career when he was asked to build and deploy a Network IDS using free software (SHADOW) after returning from a SANS conference in 1998. John has experience in security policy, program management, identity management, compliance, and application security, and speaks at national and regional security conferences on a variety of topics.

REGISTRATION LINK: Eventbrite Signup Link for Event


Igor Matlin - Warning: Security Storms are Brewing in Your JavaScript - OWASP (MSP) - May 2015


Secure360 is an annual conference providing high quality educational sessions and networking opportunities while working to identify developing trends in risk management, physical security, governance, audit, information security, contingency planning and human capital.

DC612 Meetings

DC612 meets the 2nd Thursday of the month.

President: Alex Bauert

Leadership Team: Todd Dahl

Leadership Team: Lorna Alamri

Board Oversight: David Bryan

Content and Social Media: [Eric]

Secure360 Representative: Alex Crittenden