OWASP: An Introduction By Yvan Boily March, 2005 [email_address]
Agenda <ul><li>What is OWASP </li></ul><ul><li>Discuss anything  during  the presentation!  </li></ul><ul><li>32 slides. <...
What is OWASP? <ul><li>Open Web Application Security Project </li></ul><ul><ul><li>Promotes secure software development </...
What is OWASP? <ul><li>Open Web Application Security Project </li></ul><ul><ul><li>Non-profit, volunteer driven organizati...
What is OWASP? <ul><li>What do they provide? </li></ul><ul><ul><li>Publications </li></ul></ul><ul><ul><ul><li>OWASP Top 1...
OWASP Publications <ul><li>Major Publications </li></ul><ul><li>Top 10 Web Application Security Vulnerabilities </li></ul>...
OWASP Publications <ul><li>Common Features </li></ul><ul><ul><li>All OWASP publications are available free for download fr...
OWASP Publications – OWASP Top 10 <ul><li>Top 10 Web Application Security Vulnerabilities </li></ul><ul><ul><li>A list of ...
OWASP Publications - OWASP Top 10 <ul><li>Current Top Ten Issues </li></ul><ul><ul><li>A1. Unvalidated Input </li></ul></u...
OWASP Publications - OWASP Top 10 <ul><li>Addressing the Top Ten </li></ul><ul><ul><li>In Presentation (Future Meetings) <...
OWASP Publications - OWASP Guide <ul><li>Guide to Building Secure Web Applications </li></ul><ul><ul><li>Provides a baseli...
OWASP Publications - OWASP Guide <ul><li>Future Topics regarding the Guide </li></ul><ul><ul><li>In Presentation (Future M...
OWASP Publications – OWASP Legal <ul><li>Legal Project </li></ul><ul><ul><li>This project is under development </li></ul><...
OWASP Publications – Ongoing Projects <ul><li>Ongoing Projects </li></ul><ul><ul><li>Metrics & Measurements Project </li><...
OWASP Software <ul><li>Major Applications </li></ul><ul><li>WebGoat </li></ul><ul><li>WebScarab </li></ul><ul><li>.Net Pro...
OWASP Software <ul><li>Common Features </li></ul><ul><ul><li>All OWASP software are provided free for download from  http:...
OWASP Software - WebGoat <ul><li>WebGoat </li></ul><ul><ul><li>Primarily a training application </li></ul></ul><ul><ul><li...
OWASP Software - WebGoat <ul><li>WebGoat – What can you learn? </li></ul><ul><ul><li>A number of constantly growing attack...
OWASP Software - WebScarab <ul><li>WebScarab </li></ul><ul><ul><li>A framework for analyzing HTTP/HTTPS traffic </li></ul>...
OWASP Software - WebScarab <ul><li>What can it do? </li></ul><ul><ul><li>Features </li></ul></ul><ul><ul><ul><li>Fragment ...
OWASP Software – oLab Projects <ul><li>oLab Projects </li></ul><ul><ul><li>Clearing house for projects contributed by OWAS...
OWASP Software - .NET Projects <ul><li>.Net Projects </li></ul><ul><ul><li>A collection of tools focused on securing ASP.N...
OWASP Local Chapters <ul><li>Building Communities </li></ul><ul><ul><li>Local Chapters provide opportunities for OWASP mem...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Monthly Meetings </li></ul></ul><ul><ul><li>M...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Monthly Meetings </li></ul></ul><ul><ul><ul><...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Mailing Lists </li></ul></ul><ul><ul><ul><li>...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Informative Presentations </li></ul></ul><ul>...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Vendor Neutral Environments </li></ul></ul><u...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Vendor Neutral Environments </li></ul></ul><u...
OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>What can you offer? </li></ul></ul><ul><ul><u...
OWASP Local Chapters <ul><li>Next Meeting </li></ul><ul><ul><li>March 29, 2003 </li></ul></ul><ul><ul><li>Presentation:  <...
That’s it… <ul><li>Any final words? </li></ul><ul><li>Presentation will be online: </li></ul><ul><li>http://www.owasp.org/...
Upcoming SlideShare
Loading in...5
×

香港六合彩-六合彩

1,923

Published on

里要有养猪棚的话估计就会安排香港六合彩住在猪棚里了——而香港六合彩学校总算还是腾空了以前的一座校园厂房,在里面砌上几面墙,装上几扇门,看上去总算也象是人住的地方.
当然要进这种女生宿舍,是根本不用任何手续的,其实根本就没有门卫或传达,我便又象以前一样以一种姚文远香港六合彩孙子的从容气度,大步流星长驱直入势不可挡地路过香港六合彩的女生厕所并听到几声尖叫——拷!谁叫香港六合彩自己不关门的!——然后我走进秦雨的寝室——那是一间昏暗的小房,里面挨挨挤挤地摆了四张上下铺尽管香港六合彩使用小女生的手段把这里精心妆扮了一番,可是不是偶想扫秦雨的面子看上去还是象猪窝!!
我不禁有些心痛,问:雨儿,这可比你在一师的条件差远了,能习惯吗?
就知道你会瞧不起了
我拷!闭嘴!
住一住不就习惯了吗?要在这儿住四年呢!你累吗?在我床上躺躺吧.香港六合彩说完望着我笑笑得很狐媚.
天哪!那一刻我突然忘却了赵玉.因为这句话和这个笑令我不禁陷入了一个看上去已经很遥远的年代,让我在一瞬间仿佛又回到

Published in: Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,923
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

香港六合彩-六合彩

  1. 1. OWASP: An Introduction By Yvan Boily March, 2005 [email_address]
  2. 2. Agenda <ul><li>What is OWASP </li></ul><ul><li>Discuss anything during the presentation! </li></ul><ul><li>32 slides. </li></ul>
  3. 3. What is OWASP? <ul><li>Open Web Application Security Project </li></ul><ul><ul><li>Promotes secure software development </li></ul></ul><ul><ul><li>Oriented to the delivery of web oriented services </li></ul></ul><ul><ul><li>Focused primarily on the “back-end” than web-design issues </li></ul></ul><ul><ul><li>An open forum for discussion </li></ul></ul><ul><ul><li>A free resource for any development team </li></ul></ul>
  4. 4. What is OWASP? <ul><li>Open Web Application Security Project </li></ul><ul><ul><li>Non-profit, volunteer driven organization </li></ul></ul><ul><ul><ul><li>All members are volunteers </li></ul></ul></ul><ul><ul><ul><li>All work is donated by sponsors </li></ul></ul></ul><ul><ul><li>Provide free resources to the community </li></ul></ul><ul><ul><ul><li>Publications, Articles, Standards </li></ul></ul></ul><ul><ul><ul><li>Testing and Training Software </li></ul></ul></ul><ul><ul><ul><li>Local Chapters & Mailing Lists </li></ul></ul></ul><ul><ul><li>Supported through sponsorships </li></ul></ul><ul><ul><ul><li>Corporate support through financial or project sponsorship </li></ul></ul></ul><ul><ul><ul><li>Personal sponsorships from members </li></ul></ul></ul>
  5. 5. What is OWASP? <ul><li>What do they provide? </li></ul><ul><ul><li>Publications </li></ul></ul><ul><ul><ul><li>OWASP Top 10 </li></ul></ul></ul><ul><ul><ul><li>OWASP Guide to Building Secure Web Applications </li></ul></ul></ul><ul><ul><li>Software </li></ul></ul><ul><ul><ul><li>WebGoat </li></ul></ul></ul><ul><ul><ul><li>WebScarab </li></ul></ul></ul><ul><ul><ul><li>oLabs Projects </li></ul></ul></ul><ul><ul><ul><li>.NET Projects </li></ul></ul></ul><ul><ul><li>Local Chapters </li></ul></ul><ul><ul><ul><li>Community Orientation </li></ul></ul></ul>
  6. 6. OWASP Publications <ul><li>Major Publications </li></ul><ul><li>Top 10 Web Application Security Vulnerabilities </li></ul><ul><ul><li>G uide to Building Secure Web Applications </li></ul></ul><ul><ul><li>Legal Project </li></ul></ul><ul><ul><li>Metrics & Measurements Project </li></ul></ul><ul><ul><li>Testing Project </li></ul></ul><ul><ul><li>AppSec Faq </li></ul></ul>
  7. 7. OWASP Publications <ul><li>Common Features </li></ul><ul><ul><li>All OWASP publications are available free for download from http://www.owasp.org </li></ul></ul><ul><ul><li>Publications are released under GNU “Lesser” GNU Public License agreement, or the GNU Free Documentation License (GFDL) </li></ul></ul><ul><ul><li>Living Documents </li></ul></ul><ul><ul><ul><li>Updating as needed </li></ul></ul></ul><ul><ul><ul><li>Ongoing Projects </li></ul></ul></ul><ul><ul><li>OWASP Publications feature collaborative work in a competitive field </li></ul></ul>
  8. 8. OWASP Publications – OWASP Top 10 <ul><li>Top 10 Web Application Security Vulnerabilities </li></ul><ul><ul><li>A list of the 10 most severe security issues </li></ul></ul><ul><ul><li>Updated on a yearly basis </li></ul></ul><ul><ul><li>Address issues with applications on the perimeter </li></ul></ul><ul><ul><li>Growing industry acceptance </li></ul></ul><ul><ul><ul><li>Federal Trade Commission (US Gov) </li></ul></ul></ul><ul><ul><ul><li>US Defense Information Systems Agency </li></ul></ul></ul><ul><ul><ul><li>VISA (Cardholder Information Security Program) </li></ul></ul></ul><ul><ul><li>Strong push to present as a standard </li></ul></ul>
  9. 9. OWASP Publications - OWASP Top 10 <ul><li>Current Top Ten Issues </li></ul><ul><ul><li>A1. Unvalidated Input </li></ul></ul><ul><ul><li>A2. Broken Access Controls </li></ul></ul><ul><ul><li>A3. Broken Authentication and Session Management </li></ul></ul><ul><ul><li>A4. Cross Site Scripting Flaws </li></ul></ul><ul><ul><li>A5. Buffer Overflows </li></ul></ul><ul><ul><li>A6. Injection Flaws </li></ul></ul><ul><ul><li>A7. Improper Error Handling </li></ul></ul><ul><ul><li>A8. Insecure Storage </li></ul></ul><ul><ul><li>A9. Denial of Service </li></ul></ul><ul><ul><li>A10. Insecure Configuration Management </li></ul></ul>
  10. 10. OWASP Publications - OWASP Top 10 <ul><li>Addressing the Top Ten </li></ul><ul><ul><li>In Presentation (Future Meetings) </li></ul></ul><ul><ul><ul><li>March 28 – OWASP Top Ten A1-A5 will be discussed </li></ul></ul></ul><ul><ul><ul><li>April 25 – OWASP Top Ten A6-10 will be discussed </li></ul></ul></ul><ul><ul><li>On the Mailing List </li></ul></ul><ul><ul><ul><li>The mailing list is a public forum, and as such is suitable for asking questions in general </li></ul></ul></ul><ul><ul><ul><li>Specific application issues should be discussed in private, especially with regards to business projects </li></ul></ul></ul><ul><ul><li>Focus Groups </li></ul></ul><ul><ul><ul><li>If there is sufficient interest, focus groups can be created to discuss specific issues (e.g. Data Validation, Session Management, Access Controls) </li></ul></ul></ul>
  11. 11. OWASP Publications - OWASP Guide <ul><li>Guide to Building Secure Web Applications </li></ul><ul><ul><li>Provides a baseline for developing secure software </li></ul></ul><ul><ul><ul><li>Introduction to security in general </li></ul></ul></ul><ul><ul><ul><li>Introduction to application level security </li></ul></ul></ul><ul><ul><ul><li>Discusses key implementation areas </li></ul></ul></ul><ul><ul><ul><ul><li>Architecture </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Authentication </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Session Management </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Access Controls and Authorization </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Event Logging </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Data Validation </li></ul></ul></ul></ul><ul><ul><li>Under continuous development </li></ul></ul>
  12. 12. OWASP Publications - OWASP Guide <ul><li>Future Topics regarding the Guide </li></ul><ul><ul><li>In Presentation (Future Meetings) </li></ul></ul><ul><ul><ul><li>Following the Top Ten presentations specific issues will be addressed in monthly meetings </li></ul></ul></ul><ul><ul><li>On the Mailing List </li></ul></ul><ul><ul><ul><li>The focus of the OWASP group is to address all questions pertaining to application security, of any level of technical ability </li></ul></ul></ul><ul><ul><li>Focus Groups </li></ul></ul><ul><ul><ul><li>If there is sufficient interest, focus groups can be created to discuss specific issues </li></ul></ul></ul>
  13. 13. OWASP Publications – OWASP Legal <ul><li>Legal Project </li></ul><ul><ul><li>This project is under development </li></ul></ul><ul><ul><li>First Stage – Secure Software Contract Annex </li></ul></ul><ul><ul><ul><li>Targeted towards consultants </li></ul></ul></ul><ul><ul><ul><li>Addresses secure software concerns between customers and vendors </li></ul></ul></ul><ul><ul><li>Long term objectives </li></ul></ul><ul><ul><ul><li>Provide boilerplates for application security </li></ul></ul></ul><ul><ul><ul><li>Cover legal issues from both perspectives (customer & vendor) </li></ul></ul></ul><ul><ul><li>This project does NOT provide legal advice, but rather guidelines from which legal documents can be drafted </li></ul></ul>
  14. 14. OWASP Publications – Ongoing Projects <ul><li>Ongoing Projects </li></ul><ul><ul><li>Metrics & Measurements Project </li></ul></ul><ul><ul><ul><li>Aim to address the need for useable security metrics to support business-critical decisions </li></ul></ul></ul><ul><ul><ul><li>Currently in early development </li></ul></ul></ul><ul><ul><li>Testing Project </li></ul></ul><ul><ul><ul><li>Aim to produce a “best practices” framework which can be implemented </li></ul></ul></ul><ul><ul><ul><li>Aim to produce a “low level” testing framework to identify certain issues </li></ul></ul></ul><ul><ul><li>AppSec Faq </li></ul></ul><ul><ul><ul><li>Ongoing FAQ for application security developers </li></ul></ul></ul><ul><ul><ul><li>Provides answers to questions about application security </li></ul></ul></ul>
  15. 15. OWASP Software <ul><li>Major Applications </li></ul><ul><li>WebGoat </li></ul><ul><li>WebScarab </li></ul><ul><li>.Net Projects </li></ul><ul><li>oLab Projects </li></ul>
  16. 16. OWASP Software <ul><li>Common Features </li></ul><ul><ul><li>All OWASP software are provided free for download from http://www.owasp.org </li></ul></ul><ul><ul><li>Software is released under GNU “Lesser” GNU Public License agreement </li></ul></ul><ul><ul><li>Active Projects </li></ul></ul><ul><ul><ul><li>Updating as needed </li></ul></ul></ul><ul><ul><ul><li>Ongoing Projects </li></ul></ul></ul><ul><ul><ul><li>Many maintainers and contributors </li></ul></ul></ul><ul><ul><li>OWASP Software is free for download and can be used by individuals or businesses </li></ul></ul>
  17. 17. OWASP Software - WebGoat <ul><li>WebGoat </li></ul><ul><ul><li>Primarily a training application </li></ul></ul><ul><ul><li>Provides </li></ul></ul><ul><ul><ul><li>An educational tool for learning about application security </li></ul></ul></ul><ul><ul><ul><li>A baseline to test security tools against (i.e. known issues) </li></ul></ul></ul><ul><ul><li>What is it? </li></ul></ul><ul><ul><ul><li>A J2EE web application arranged in “Security Lessons” </li></ul></ul></ul><ul><ul><ul><li>Based on Tomcat and JDK 1.5 </li></ul></ul></ul><ul><ul><ul><li>Oriented to learning </li></ul></ul></ul><ul><ul><ul><ul><li>Easy to use </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Illustrates credible scenarios </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Teaches realistic attacks, and viable solutions </li></ul></ul></ul></ul>
  18. 18. OWASP Software - WebGoat <ul><li>WebGoat – What can you learn? </li></ul><ul><ul><li>A number of constantly growing attacks and solutions </li></ul></ul><ul><ul><ul><li>Cross Site Scripting </li></ul></ul></ul><ul><ul><ul><li>SQL Injection Attacks </li></ul></ul></ul><ul><ul><ul><li>Thread Safety </li></ul></ul></ul><ul><ul><ul><li>Field & Parameter Manipulation </li></ul></ul></ul><ul><ul><ul><li>Session Hijacking and Management </li></ul></ul></ul><ul><ul><ul><li>Weak Authentication Mechanisms </li></ul></ul></ul><ul><ul><ul><li>Many more attacks added </li></ul></ul></ul><ul><ul><li>Getting the Tools </li></ul></ul><ul><ul><ul><li>http://www.owasp.org/software/webgoat.html </li></ul></ul></ul><ul><ul><ul><li>Simply download, unzip, and execute </li></ul></ul></ul>
  19. 19. OWASP Software - WebScarab <ul><li>WebScarab </li></ul><ul><ul><li>A framework for analyzing HTTP/HTTPS traffic </li></ul></ul><ul><ul><li>Written in Java </li></ul></ul><ul><ul><li>Multiple Uses </li></ul></ul><ul><ul><ul><li>Developer: Debug exchanges between client and server </li></ul></ul></ul><ul><ul><ul><li>Security Analyst: Analyze traffic to identify vulnerabilities </li></ul></ul></ul><ul><ul><li>Technical Tool </li></ul></ul><ul><ul><ul><li>Focused on software developers </li></ul></ul></ul><ul><ul><ul><li>Extensible plug-in architecture </li></ul></ul></ul><ul><ul><ul><li>Open source; easy to extend core system </li></ul></ul></ul><ul><ul><ul><li>Very powerful tool </li></ul></ul></ul><ul><ul><li>Getting the Tool </li></ul></ul><ul><ul><ul><li>http://www.owasp.org/software/webscarab.html </li></ul></ul></ul>
  20. 20. OWASP Software - WebScarab <ul><li>What can it do? </li></ul><ul><ul><li>Features </li></ul></ul><ul><ul><ul><li>Fragment Analysis – extract scripts and html as presented to the browser, instead of source code presented by the browser post render </li></ul></ul></ul><ul><ul><ul><li>Proxy – observe traffic between the browser and server, includes the ability to modify data in transit, expose hidden fields, and perform bandwidth manipulation </li></ul></ul></ul><ul><ul><ul><li>BeanShell – the ability to execute Java code on requests and responses before being transmitted between the browser and server; allows runtime extension of WebScarab </li></ul></ul></ul><ul><ul><ul><li>Spider – identifies new URLs within each page viewed </li></ul></ul></ul><ul><ul><ul><li>SessionID Analysis – Collection and analysis of cookies to determine predictability of session tokens </li></ul></ul></ul><ul><ul><ul><li>Much more… </li></ul></ul></ul>
  21. 21. OWASP Software – oLab Projects <ul><li>oLab Projects </li></ul><ul><ul><li>Clearing house for projects contributed by OWASP members </li></ul></ul><ul><ul><li>Smaller tool sets, proofs of concept, etc </li></ul></ul><ul><ul><li>Current Tools </li></ul></ul><ul><ul><ul><li>CodeSpy – Attempts to analyze Java code for Top 10 issues </li></ul></ul></ul><ul><ul><ul><li>WebSphinx – Java Webcrawler designed for extensibility </li></ul></ul></ul><ul><ul><ul><li>C# Spider – basic framework for spidering web pages, and excellent starting point for a security tool </li></ul></ul></ul><ul><ul><ul><li>PHP Filters – a collection of PHP functions for sanitizing user input to protect against Cross Site Scripting and SQL injection issues </li></ul></ul></ul><ul><ul><li>http://www.owasp.org/software/labs.html </li></ul></ul>
  22. 22. OWASP Software - .NET Projects <ul><li>.Net Projects </li></ul><ul><ul><li>A collection of tools focused on securing ASP.NET projects </li></ul></ul><ul><ul><li>Include security analyzers and documentation projects </li></ul></ul><ul><ul><li>Current Projects </li></ul></ul><ul><ul><ul><li>Asp.Net Baseline Security – a suite of tools to assist administrators in identifying common issues in Asp.Net deployments </li></ul></ul></ul><ul><ul><ul><li>SAM’SHE – Security Analyzer for Microsofts Shared Hosting Environments – toolkit for administrators to identify issues in IIS 5 or 6 Asp.Net deployments </li></ul></ul></ul><ul><ul><ul><li>ANSA – Asp.Net Security Analyzer written in C# to identify configuration and software issues that impact security </li></ul></ul></ul><ul><ul><ul><li>Asp.Net Security Guides – a set of documents covering the design and deployment of secure software in Asp.Net hosting environments </li></ul></ul></ul><ul><ul><li>http://www.owasp.org/software/dotnet.html </li></ul></ul>
  23. 23. OWASP Local Chapters <ul><li>Building Communities </li></ul><ul><ul><li>Local Chapters provide opportunities for OWASP members to share ideas and learn information security </li></ul></ul><ul><ul><li>Open to all; any level of proficiency </li></ul></ul><ul><ul><li>Provide a forum to discuss issues based on local regulation and legislation </li></ul></ul><ul><ul><li>Provide venue for invited guests to present new ideas and projects </li></ul></ul>
  24. 24. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Monthly Meetings </li></ul></ul><ul><ul><li>Mailing Lists </li></ul></ul><ul><ul><li>Presentations & Groups </li></ul></ul><ul><ul><li>Vendor Neutral Environments </li></ul></ul><ul><ul><li>Open Forums for Discussion </li></ul></ul>
  25. 25. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Monthly Meetings </li></ul></ul><ul><ul><ul><li>An opportunity to listen to monthly presentations introducing OWASP (prior to regular meetings) </li></ul></ul></ul><ul><ul><ul><li>An opportunity to attend special presentations focused on OWASP projects, and focusing on specific areas of interest </li></ul></ul></ul><ul><ul><ul><li>An opportunity to work with organizers to show additional presentations and develop workshops to address specific issues </li></ul></ul></ul><ul><ul><ul><li>An open environment for discussion of information security suitable for novices, professionals, and experts </li></ul></ul></ul><ul><ul><ul><li>Free Coffee!!!!! </li></ul></ul></ul>
  26. 26. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Mailing Lists </li></ul></ul><ul><ul><ul><li>A wide selection of mailing lists are available from the OWASP main page, including specific mailing lists for all topics covered today </li></ul></ul></ul><ul><ul><ul><li>A local mailing list which can be used to arrange focus groups, monthly meetings, and discuss issues of importance locally </li></ul></ul></ul><ul><ul><ul><ul><li>Discuss any OWASP related topic; application security, information security related topics, etc </li></ul></ul></ul></ul><ul><ul><ul><li>A couple of rules </li></ul></ul></ul><ul><ul><ul><ul><li>Lets keep it professional; most subscribers currently receive messages to business accounts </li></ul></ul></ul></ul><ul><ul><ul><ul><li>No sales or marketing materials; the list will be restricted to subscribers without moderation, however if spam becomes an issue moderation will be enforced </li></ul></ul></ul></ul>
  27. 27. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Informative Presentations </li></ul></ul><ul><ul><ul><li>Every monthly meeting will host a 60 minute presentation on a new topic or area of interest </li></ul></ul></ul><ul><ul><ul><li>Strong focus on building understanding of technical issues </li></ul></ul></ul><ul><ul><ul><li>If enough interest is generated, specialized presentations can be scheduled </li></ul></ul></ul><ul><ul><li>Focus Groups </li></ul></ul><ul><ul><ul><li>As the organization grows focus groups may form allowing for focused discussion outside of monthly meetings </li></ul></ul></ul><ul><ul><ul><li>Formalized focused groups can be created to tackle specific issues </li></ul></ul></ul>
  28. 28. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Vendor Neutral Environments </li></ul></ul><ul><ul><ul><li>Learn about security without the sales pitches </li></ul></ul></ul><ul><ul><ul><li>OWASP does not sell </li></ul></ul></ul><ul><ul><ul><ul><li>All revenue generated from either website advertising or donations </li></ul></ul></ul></ul><ul><ul><ul><li>Strict guidelines for chapter presentations and sponsorship </li></ul></ul></ul><ul><ul><ul><ul><li>All sponsors must be approved by The OWASP Foundation. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>No product presentation may take place at any meeting of a local chapter. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Presentations that focus on a problem or set of problems and discuss solution approaches that may refer to or show examples of various products are allowed. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Sponsorship shall be in the form of donations to The OWASP Foundation in the name of the local chapter and to provide food / beverages at meeting events. </li></ul></ul></ul></ul>
  29. 29. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>Vendor Neutral Environments </li></ul></ul><ul><ul><ul><li>Vendor Neutral Meeting Environments </li></ul></ul></ul><ul><ul><ul><ul><li>Future meetings to be held at the University of Winnipeg campus </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Location: </li></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Room 403 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>294 William Ave. </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Winnipeg, MB </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Meeting Schedule </li></ul></ul></ul><ul><ul><ul><ul><li>Last Tuesday of Each Month </li></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Mar. 29 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Apr. 26 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>May 31 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>June 28 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>July 26 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Aug. 30 </li></ul></ul></ul></ul></ul>
  30. 30. OWASP Local Chapters <ul><li>What do we have to offer? </li></ul><ul><ul><li>What can you offer? </li></ul></ul><ul><ul><ul><li>The mailing lists, meetings, and focus groups are open forums for discussion of any relevant topics </li></ul></ul></ul><ul><ul><ul><li>Members are encouraged to bring forward questions </li></ul></ul></ul><ul><ul><ul><li>Members are encouraged to participate in OWASP projects </li></ul></ul></ul><ul><ul><ul><ul><li>Contribute to existing projects </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Propose new projects </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Spearhead new ventures </li></ul></ul></ul></ul><ul><ul><ul><li>Local chapter executive team will work towards building the organization as a free, open, and technically oriented resource for the general public and members </li></ul></ul></ul><ul><ul><ul><ul><li>Email contact information is available on local chapter site </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Full contact information can be elicited via email </li></ul></ul></ul></ul>
  31. 31. OWASP Local Chapters <ul><li>Next Meeting </li></ul><ul><ul><li>March 29, 2003 </li></ul></ul><ul><ul><li>Presentation: </li></ul></ul><ul><ul><ul><li>OWASP Top Ten (Part 1), Yvan Boily </li></ul></ul></ul><ul><ul><li>Location: </li></ul></ul><ul><ul><ul><li>Room 403 </li></ul></ul></ul><ul><ul><ul><li>294 William Ave. </li></ul></ul></ul><ul><ul><ul><li>Winnipeg, MB </li></ul></ul></ul>
  32. 32. That’s it… <ul><li>Any final words? </li></ul><ul><li>Presentation will be online: </li></ul><ul><li>http://www.owasp.org/local/winnipeg.html </li></ul><ul><li>Thank you! </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×