This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Sacramento"

From OWASP
Jump to: navigation, search
(Next meeting: THREAT MODELING WORKSHOP, Thursday, September 30 2010 6-8pm)
Line 1: Line 1:
{{Chapter Template|chaptername=Sacramento|extra=The chapter leaders are [mailto:[email protected] Roman Hustad], [mailto:[email protected] Matt Petteys], and [mailto:[email protected] Michael Weber].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sacramento|emailarchives=http://lists.owasp.org/pipermail/owasp-sacramento}}
+
{{Chapter Template|chaptername=Sacramento|extra=The chapter leaders are [mailto:[email protected] Roman Hustad] and [mailto:[email protected] Michael Weber].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sacramento|emailarchives=http://lists.owasp.org/pipermail/owasp-sacramento}}
  
 
== Charter ==
 
== Charter ==
Line 9: Line 9:
 
Threat Modeling is one of the cheapest and most effective methods to identify and prioritize security risks, but few practice it because it is perceived as too difficult.  Roman Hustad will share from his threat modeling experiences how a basic threat model can be constructed in hours rather than days.  This will be a ''work''shop, not a presentation so come prepared to stand up and participate.  Roman will give a brief introduction to Threat Modeling and propose a simplified methodology.  The team will then build a threat model for the fictional Hacme Books e-commerce web application (optional: [http://www.foundstone.com/us/resources/proddesc/hacmebooks.htm download] and play with the application ahead of time).
 
Threat Modeling is one of the cheapest and most effective methods to identify and prioritize security risks, but few practice it because it is perceived as too difficult.  Roman Hustad will share from his threat modeling experiences how a basic threat model can be constructed in hours rather than days.  This will be a ''work''shop, not a presentation so come prepared to stand up and participate.  Roman will give a brief introduction to Threat Modeling and propose a simplified methodology.  The team will then build a threat model for the fictional Hacme Books e-commerce web application (optional: [http://www.foundstone.com/us/resources/proddesc/hacmebooks.htm download] and play with the application ahead of time).
  
Dinner and drinks will be provided by the chapter.  (Thanks to those of you who became OWASP members in 2010!)
+
Pizza and drinks will be provided by the chapter.  (Thanks to those of you who became OWASP members in 2010!)
  
  

Revision as of 17:36, 22 September 2010

OWASP Sacramento

Welcome to the Sacramento chapter homepage. The chapter leaders are Roman Hustad and Michael Weber.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Charter

The Sacramento OWASP Chapter promotes the principles of OWASP in our local community with an emphasis on education, local networking opportunities, and fun. Meetings are typically on the last Thursday evening of the month.


Next meeting: THREAT MODELING WORKSHOP, Thursday, September 30 2010 6-8pm

Threat Modeling is one of the cheapest and most effective methods to identify and prioritize security risks, but few practice it because it is perceived as too difficult. Roman Hustad will share from his threat modeling experiences how a basic threat model can be constructed in hours rather than days. This will be a workshop, not a presentation so come prepared to stand up and participate. Roman will give a brief introduction to Threat Modeling and propose a simplified methodology. The team will then build a threat model for the fictional Hacme Books e-commerce web application (optional: download and play with the application ahead of time).

Pizza and drinks will be provided by the chapter. (Thanks to those of you who became OWASP members in 2010!)


SPEAKER BIO: Roman Hustad is a local enterprise software developer in the financial services industry and was formerly a software security consultant at Foundstone. He has constructed applications large and small and torn others apart via penetration testing, threat modeling, and code review. Roman also enjoys teaching software security and is one of the OWASP Sacramento chapter leaders.


RSVP & LOCATION: Please RSVP for this event. Upon arriving at the main entrance, please ask for Robert Grill, office: 916-636-4392, cell: 916-997-9892. Any problems, please contact Roman Hustad, 916-402-0620

  • HP Medi-Cal (map)
    3215 Prospect Park Drive
    Rancho Cordova , CA
    95670

Future meetings

We always want ideas! Send your request for a meeting topic to a chapter leader or the chapter mailing list.


Past Meetings

2010-06-24: Michael Weber conducted a "SQL Injection Lab"

2010-05-27: Erik Peterson of Veracode presented "Automated Web Application Testing - Why we're Doing It Wrong"

2010-04-29: Roman Hustad presented "The Secure Software Development Lifecycle"

2010-03-25: Mike Fauzy of Aspect Security presented "Tool Assisted Manual Code Review - Manual Precision with Automated Performance"

2010-02-25: Arshad Noor of StrongAuth, Inc. presented "Key Management & Encryption" Download presentation

2009-12-09: Alex Smolen presented "The OWASP .NET ESAPI"

2009-10-08: Ned Allison chaired a roundtable on "Database Security"

2009-07-30: Roman Hustad presented "Hands-on Cross-Site Scripting"

2009-05-12: Roman Hustad presented "Hands-on SQL Injection"

2008-10-30: Joy Forsythe from Fortify Software presented "Voting Security."

2008-07-31: Roman Hustad presented "How to Test the Security of Web Applications."

2008-06-26: Shan Zhou from Imperva presented "Database Security."

2008-04-03: Ryan C. Barnett from Breach Security presented "Passive Web Application Defect Identification."

2007-11-29: Roman Hustad from Foundstone presented "Web Application Hacking" to over 40 attendees.

2007-08-30: Barmak Meftah from Fortify Software presented "Hack proof your Service-Oriented Architecture" to 15 attendees.