Minneapolis St Paul
- 1 NEWS - OWASP becomes an affiliate of UMSA in support of the Secure 360 conference.
- 2 Videos:
- 3 Upcoming Speakers:
- 4 Thanks
- 5 Next meeting: Monday June 16th at 6:00 pm
- 6 July Meeting: Monday, July 7, 6:00 p.m.
- 7 September Meeting (tbd)
- 8 Other Industry Events:
NEWS - OWASP becomes an affiliate of UMSA in support of the Secure 360 conference.
Secure360°™ is an annual conference providing high quality educational sessions and networking opportunities while working to identify developing trends in risk management, physical security, governance, audit, information security, contingency planning and human capital. As the host of Secure360°, UMSA strives to provide expert speakers, informative educational sessions and a wide range of exhibits for the collective membership and resources of individual associations, supplier partners and general public. (See the Members & Affiliates page for further information.) http://www.secure360.org/index.html
I uploaded the videos and I will follow up with their presentations soon. I apologize for the delay. The video and sound quality is not the best but works. You can get to both videos here: https://www.owasp.org/index.php/Category:OWASP_Video#Videos
Tony Stieber from Wells Fargo will be speaking on Encryption on June 16. See announcement below.
Gunnar Peterson will be presenting "Breaking Web Services."
Andrew can der Stock has agreed to visit our chapter and discuss the new Enterprise Security API. We do not have an exact day yet, as soon us we get one I will let the members know.
Thanks to NetSpi for providing Coffee and Cookies for this event. If your organization would like to sponsor the book give-away or refreshments please contact Lorna Alamri at 651-259-1001.
Next meeting: Monday June 16th at 6:00 pm
Tony Stieber – How NOT to Implement Encryption for the OWASP Top 10
How NOT to implement encryption for the OWASP Top Ten. Three out of the ten items in the OWASP Top Ten are related to encryption. These items, A7, A8, and A9, are merely misuse or non-use of well-known and readily available tools. Best practices will be explained and illustrated with counter-examples with the goal of explaining how web applications and cryptography meet.
Tony Stieber has been working in the information security industry for over 12 years, with 8 of those years in the Fortune 100. His past experience includes mainframes, supercomputers, military and commercial firewalls, medical diagnostic systems, dot com ventures, retail environments, large financial systems, and cryptology.
Minneapolis Community and Technical College 1501 Hennepin Ave, Minneapolis Whitney Center, Room L3100 (3rd Floor)
Park in the ramp (R) - move through the T building (T) and go to Whitney Hall (L).
6:00 pm - Introduction and Optional sign-in for CISSP credits 6:10 pm - Welcome: OWASP chapter updates (Kuai Hinojosa) 6:20 pm – Encryption (Tony Stieber) 7:55 pm – break 8:05 pm – Book Giveaway 8:10 pm - Upcoming Events reminder and meeting wrap – up
Please RSVP at https://www.go-integral.net/?q=TonySJune
Integral Business Solutions
July Meeting: Monday, July 7, 6:00 p.m.
Gunnar Peterson (Arctec) will be presenting "Breaking Web Services". Gunnar gave this talk with Brian Chess at the past RSA conference. Another interesting topic don't forget to bring lots of questions to this presentation as well.
September Meeting (tbd)
Brian Chess (Fortify Software)
Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine tooth comb and uncover the kinds of errors that lead directly to vulnerabilities. This talk frames the software security problem and shows how static analysis is part of the solution.
- The most common security short-cuts and why they lead to security failures
- Why programmers are in the best position to get security right
- Where to look for security problems
- How static analysis helps
- The critical attributes and algorithms that make or break a static analysis tool
We will look at how static analysis works, how to integrate it into the software development processes, and how to make the most of it during security code review.
Other Industry Events:
MN ISSA- Meets on Tuesday July 15th at the Four Points Sheraton, 1330 Industrial Blvd. Mpls, MN. For more information on speakers and topics. http://www.mn-issa.org/html/chaptermeetings.html
TCJUG (Twin Cities Java Users Group) meets June 16 and July 14 at Intertech, Inc in Eagan. http://www.intertechtraining.com/UserGroups/JavaUserGroup.aspx