Most of our chapter event coordination is done via meetup. Hit the link for the latest:
We would like to thank Travelers Insurancefor their generous sponsorship and helping make application security visible…
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email Alvin Fong with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
Call for Sponsors/Speakers
This is a call for speakers/papers. If we haven’t approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn’t have it any other way.
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.
Some topics of interest for upcoming meetings include (but are not limited to):
- Risk Rating Methodologies
- Internet of Things (IOT) Security
DevOps vs. the “Security People”
Date/Time: Friday, 6/21 1-3pm
1pm: ”DevOps vs “Security People”
In 2019, surveys are saying that 90% of Fortune 500 plan on using containers and things like Kubernetes, yet there’s still a divide between what “security people” see that containers provide and what DevOps teams see. Kubernetes has become the defacto standard for production container deployments and there are 98 different options (as of February 2019) for hosted Kubernetes clouds. In many cases a Kubernetes threat model becomes compromised either by accident or by alibi and even if you wanted to harden your environment, there’s little guidance. Is there truly such a thing as a Kubernetes best practice? How can Kubernetes handle multiple tenants in a cluster? Do hosted Kubernetes services provide enough security for your work load? This talk will explore Kubernetes’ known attack vectors, defenses, and see how we can bridge the silos between security engineers and developers to help in the future.
2pm: panel / chapter meeting TBD
Speaker: Mark Manning is a Principal Security Consultant with NCC Group and a lead in their Container Practice. He focuses on container technologies, Linux kernel security, and application security, in general. He has performed penetration tests to breakout from containers, delivered architecture reviews of devops environments, and worked with developers on various container and orchestration technologies such as Docker, Kubernetes, Mesos/Marathon, as well as Rancher. Mark currently organizes Rochester 2600 has also organized BSidesROC from 2010 through 2018.
Saturday, November 3, 2018
OWASP @ bSides CT - Sat, Nov 3rd - Fairfield, CT
The local BSides Security conference in CT is taking place Sat, Nov 3, 2018 in Fairfield, CT. Their CFP is out, and I would encourage you to submit a talk. Tickets are available for the actual conference are $20 and can be purchased here: https://www.eventbrite.com/e/bsides-ct-2018-tickets-49521252399
The conference will feature speakers, workshops, CTF (with prizes!), lightning talks, and an after-party.
Schedule updates and additional info: www.bsidesct.org
Security BSides is a community-driven framework used to build events for and by information security community members, events where individuals have opportunities to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense experience designed to expand the spectrum of conversation beyond the traditional confines of space and time with discussions, demos, and participant interaction. It’s where conversations on the next big thing are happening
About Fairfield University:
Fairfield University sits on the Connecticut coast and is conveniently located ½ mile from the train station offering a central location for all attendees, whether taking public transit, train, or driving. The Amtrak and MTA access means we’re close enough to New York City to turn a day trip into an adventure, yet far enough to make Fairfield seem like a completely different world. BSides Connecticut provides a much-needed link between information security professionals and the Connecticut technology community by offering a forum for collaborative presentations, information exchange, and ideas.
Fairfield U - Day in the Life of a CyberSecurity Professional
As part of our Academic initiative to partner with local colleges/universities, Fairfield University CISO Bill Reyor, has invited OWASP to Fairfield University this coming Friday Oct 12 @ 11am at the Fairfield University DiMenna-Nyselius Library on 5171, 1073 N Benson Rd, Fairfield, ct, 06824.
This session is oriented toward college students and new college graduates exploring computer security (“cybersecurity”) as a career path. We plan to discuss:
*The State of Computer Security Employment and need for diversity to solve tomorrow’s security challenges (It’s not all Computer Science)
*Profiles of Computer Security Career Paths
*The Day in the Life of a Security Professional, by your truly.
*The need for Business, Medical, and Technology undergraduates and graduates to work together as security becomes an increasingly interdisciplinary challenge
Call to action:
For area security professionals with open reqs for new/college-hires, please reach out in advance or connect me with your HR point of contact so that we can share opportunities with students that attend and are actively looking for local opportunities.
2PM - 4PM
2-3pm: Yaxa (Startup security spotlight) - Kalpesh Sheth
*Introduction to Yaxa, part of Hartford’s InsurTech startup accelerator
*Emerging trends in cyber threat vectors
*Which tools people are using and what security vendors are doing?
*What is state of the art – when hackers are changing their TTPs?
*Why users are the weakest link and what to do about it?
3-4pm: OWASP CT Chapter Meeting (2018 community initiatives)
*Who’s hiring? Help
*What topics/challenges are security practitioners having and looking for assistance with?
*Community initiatives - What would folks like to see OWASP and local CT members doing?
*Blockchain Security Thinking
4pm: Networking / HH
City Steam Brewery
942 Main St, Hartford, CT 06103
About Kalpesh Sheth:
With 20+ years of technical expertise in data networking, network security, Intelligence Surveillance and Reconnaissance (ISR), and Cluster Computing, Kalpesh Sheth has been an instrumental leader in the execution of several complex development projects from inception to deployment. Sheth has served as a founding team member and senior executive at several successful startups and large companies. Before co-founding Yaxa, Sheth was Senior Technical Director at DRS Technologies (acquired by Finmeccanica S.p.A.), Director at RiverDelta Networks (acquired by Motorola and now part of Arris) and fifth employee of Digital Technology (acquired by Agilent Technologies). He is a co-author of VITA 41.6 an ANSI standard, and has spoken at numerous trade conferences as an expert panel member. Sheth holds M.S. in Computer Science from Texas A\&M University, and an MBA from MIT Sloan School of Management.
What to bring
*Ideas for community-based 2018 initiatives
*Security questions you’re looking for help from other security pros in the area
Agenda: Saturday, Oct 7th 2017 9:00AM - 6:00PM OWASP @ BSidesCT: Accelerating & Pivoting your Security Career
James and I will be presenting on Accelerating and Pivoting your security career.
Title: Accelerating and Pivoting your Security Career
Abstract: This talk is for folks either trying to identify paths into the InfoSEC space, and for experienced security professionals trying to pivot and jump start alternative security career paths. We’ll map out different career paths and identify key skills for success, discuss how to build them, and resources you can take advantage of locally here in CT.
Agenda: Thursday, Jun 15th 2017 6:00PM - 9PM Wireless Security Workshop
This session will take a departure from some of our recent OWASP sessions. The hosts at MakeHartford have generously offered their classroom space for this security lab session/workshop coming out of the OWASP pen-testing initiative group. Jon Williams will be presenting and demonstrating some fundamental wireless security concepts. Depending on time and if we get access to some COTS routers, we may also try to do some hands-on wireless security testing. Plan on bringing your laptop and spare wireless router if you can. This session is oriented toward folks looking to learn about wireless security and getting introduced to wireless security concepts for the first time.
Note: Due to the classroom size, we’re limiting this to the first 20 participants.
- Overview: Wireless security concepts
- Remote access, Local network - encrypted and unencrypted
- Wireless attacks:
- Rogue access point, MiTM, Session Hijacking, Radio monitoring, Session theft
- Review: Risks to remote workers
- Game time: defensive techniques
- Demonstration: Wireless Man-in-the-Middle and Rogue AP
About Jon Williams:
Jon Williams hails from Cheshire, CT, where he lives with his wife and daughter and works from home as Security Administrator for IGG Software. A taste for adventure has carried him far, from the islands of the Bahamas where he worked towards building an eco-hostel, to the deserts of Egypt where he taught children at environmental leadership camps, to the high seas where he circumscribed the globe in a steamship. His passion for technology led him into the security field, where he now spends an unhealthy proportion of his time trying to break computer systems so that others might improve them. He recently attained a CISSP certification and actively contributes to projects at OWASP Hartford
Agenda: Wednesday, Apr 26th 2017
6:30PM - 9PM
OWASP @ MakeHartford
We’ve got a new team working on putting together a security / pen testing lab and security learning environment here in CT. The goal is to have a place where we can create and share security and pen testing tips and tricks with our members, as well as using the lab as a means to bolster our outreach efforts to the colleges in the area.
We’re going to use this initial session to explore the MakeHartford space and start building up that lab. If you’re interested, we would love to see you at this session. Otherwise, shoot me an email and i’ll keep you posted on working group meetings moving forward.
Thanks to the current volunteer team and Steve Yanicke @MakeHartford:
- Dain Perkins
- Darin Wilborne
- Jon Williams
- Kevin Tobin
- Adam Haller
- Cameron Morris
Agenda: Wednesday, Mar 29th 2017 6:30PM - 9PM OWASP UCONN Presentation: https://www.owasp.org/images/e/ef/Hartford-UCONN-March-2017.pdf
The next OWASP Hartford chapter meeting will be held at the ITE Building Room 301 on the University of Connecticut Campus in Storrs. We are conducting an interactive session with students of the cybersecurity club and will be inviting participation from students attending Law, Business and Medical schools for an enlightening discussion on Healthcare Information Security. As usual, this event is kid-friendly and OWASP-approved with a healthy dose of FREE TO ATTEND sprinkled on top.
Agenda: Thursday, Sep 29th 2016
2PM - 4PM
The next OWASP Hartford chapter meeting will focus on Fraud Analytics. James Ruotolo from SAS will be joining us to discuss fraud analytics methodologies, fraud patterns in insurance. There will also be a walkthrough of Visualization technologies, Risk Scoring, and Cybersecurity. ![Owasp_Hartford_-Exploring_fraud_analytics.pdf](Owasp_Hartford-Exploring_fraud_analytics.pdf “Owasp_Hartford-_Exploring_fraud_analytics.pdf”)
Agenda: Exploring Fraud Analytics 1. Introduction a. Business analytics b. Example fraud analytics use cases 2. Fraud analytics methodology a. Detection techniques b. Data management considerations c. Deployment and operationalization 3. Case study: Fraud analytics in insurance a. Visualization technology b. Fraud risk scoring and alert triage c. Cybersecurity d. Example results 4. Q\&A About James Ruotolo: James Ruotolo is the product line leader for the fraud and security intelligence solution portfolio at SAS®. He is responsible for product management and marketing of fraud detection and compliance solutions for the banking, insurance, healthcare and government industries. Before joining SAS®, James was the Director of Strategic Operations for the special investigation unit of a large multi-line US insurance company where he was responsible for investigative analytics and intelligence operations. He has nearly two decades of investigation and fraud analytics experience. Connect with him on Twitter @jdruotolo Agenda: Thursday, May 26th 2016 Industry Cyber Security Panel
Brian Bemis – Travelers - Director of Application Security and Public Key Infrastructure Brian’s area of focus includes Application security, penetration testing, network security, Secure SDLC, and certificates
Brian Heemsoth – Aetna – Director of Software and Mobile Security Brian Heemsoth is responsible for designing and implementing security solutions with a user experience focus, application security, mobile security and incident response.
Joe Niquette – UnitedHealth Group – Security Solutions Architect Joe’s involved in security research and development and passionate about rugged DevOps.
Ankur Singhal – the Hartford – Manager Application Security Ankur’s focus is web and mobile application security, security vulnerability management and remediation, Secure SDLC, PKI and cert management, Encryption at rest and most recently Security in DevOps
2:00 PM to 4:00 PM
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)
Agenda: Tuesday, February 9th 2016
Threat Modeling for Architects, Business Analysts and Quality Assurance Professionals’ Category Robert Hurlbut Independent software security consultant, architect and trainer Hurlbut Consulting Services 6:00 PM to 7:00 PM
Future Direction of Chapter James McGovern 7:00 PM to 7:30 PM
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)
Agenda: Tuesday, April 16th 2013 Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations Gene Kim - CTO of Tripwire This meeting will be held at Travelers in Downtown Hartford
Agenda: Tuesday, May 27th 2014 OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category Senior Security Engineer at Arxan Technologies 5:00 PM to 6:00 PM
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods? Tarek Khaled, Senior Security Engineer at Okta 6:00 PM to 7:00 PM
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)
Agenda: Tuesday, October 22nd 2013 Mobile Security: Attacks and Defenses Gene Meltser, Technical Director, Neohapsis Labs 5:00 PM to 6:00 PM
An Application Pen Tester’s introduction to Android Internals Tom Palarz, Senior Security Consultant, Neohapsis Labs 6:00 PM to 7:00 PM This meeting was held at Travelers, Hartford CT (Central Row Conference Room)
Agenda: Tuesday, June 6th 2013 Building a Better Botnet Michael Smith, Akamai This meeting will be held at the Travelers in Hartford
Agenda: Tuesday, May 6th 2013 Web Services Security James McGovern, HP Enterprise Services This meeting was held at the ACORD LOMA Forum in Las Vegas
Agenda: Wednesday, April 24th 2013 Cloud and Identity George Dobbs, Enterprise Architect - MassMutual 8:30 AM to Noon This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)
Agenda: Wednesday, October 24th 2012 International Institute of Business Analysts (IIBA) Joint Meeting James McGovern - Introduction to Security for Business Analysts This meeting was held at Chubb in Simsbury Agenda: Wednesday, September 26th 2012 Joint Meeting with OWASP Student Chapter Introduction to Network Security Anthony DAmato Agenda: Wednesday, May 23rd 2012 Introduction to SOA Security James McGovern Agenda: Tuesday, May 18th 2010 Joint Meeting with ISACA on the topic of auditing web applications Dmitry Zhdanov presentation is located here Mark Wireman presentation is located here James Ritche presentation is located here Mark Coderre presentation is located here Agenda: Thursday, December 3rd 2009
Agenda: Tuesday, November 17th 2009
ATTACK YOUR DATABASE BEFORE OTHERS DO Todd Desantis, Lead Sales Engineer Sentrigo
Agenda: Tuesday, October 13th 2009
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING Michael Waidner, Distinguished IBM Engineer and Security CTO IBM
Agenda: Monday, September 14th 2009
OWASP: WHERE WE ARE AND WHERE WE ARE GOING Tom Brennan, OWASP Board Member OWASP
WEB APPLICATION SECURITY ASSURANCE Gregory Gotta, SVP Security CA
Agenda: Wednesday, June 10th 2009
Agenda: Tuesday, April 30th 2009
RECRUITING ELITE IT TALENT Jordan Haberfield (Agile Elephant), SVP of System One
DETECTING BACKDOORS IN WEB APPLICATIONS Chris Wysopal CTO, Veracode
Agenda: Monday, April 13th 2009
Agenda: Tuesday, February 10th 2009
OPEN SOURCE IDENTITY SERVICES (The Higgins Project) Mary Ruddy, Meristic
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS Ramesh Nagappan, Security Architect at Sun Microsystems
STATE OF WEB APPLICATION SECURITY Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP
Agenda: Wednesday, November 11th 2008
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM Richard Eisenberg, Architect at Voltage Security
Agenda: Wednesday, September 24th 2008
Agenda: Wednesday, June 11th 2008
CARDSPACE AND USER CENTRIC IDENTITY Chris Winn, Security Evangelist, Microsoft
Agenda: Wednesday, April 30th 2008
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES Anton Chuvakin, Chief Logging Evangelist, LogLogic
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE Jack Danahy, CTO and Founder, Ounce Labs
Agenda: Thursday, February 28th 2008
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY Chenxi Wang, Principal Analyst, Forrester Research
EXPLOITING ONLINE GAMES Gary McGraw, CTO, Cigital
All meetings are held at the headquarters of Travelers Insurance 45 Central Row, Hartford CT 06103 (Entrance is between Dunkin Donuts and CVS pharmacy). Free parking is available in their Propspect Street Garage (Next to Hartford Club).
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.