SlideShare a Scribd company logo
Welcome to our Belgian IT
Security community
Sebastien Deleersnyder, Toreon, OWASP
CYBER SECURITY CHALLENGE BELGIUM 2019
Building our cybersecurity community!
1. Our community
2. Volunteering
OWASP
• The Open Web Application
Security Project (OWASP) is a
worldwide not-for-profit charitable
organization focused on
improving the security of
software.
• Our mission is to make software
security visible, so that
individuals and organizations are
able to make informed decisions.
3
https://www.owasp.org
OWASP Belgium
• Regular chapter meetings
• Yearly BeNeLux conference
4
https://www.owasp.org/index.php/Belgium
https://twitter.com/owasp_be
Google Groups:
https://groups.google.com/a/owasp.org/forum/#!forum/belgium-chapter/join
OWASP Projects
5
Tools
Zed Attack Proxy
Web Testing Environment Project
OWTF
Dependency Check
Security Shepherd
DefectDojo Project
Juice Shop Project
Security Knowledge Framework
Dependency Track Project
Code
ModSecurity Core Rule Set
OWASP CSRFGuard
Documentation
Application Security Verification Standard
Software Assurance Maturity Model (SAMM)
AppSensor Project
Top Ten Project
Testing Project
open-security-summit.org
Tracks on API Security, CISO, DevSecOps, Machine Learning, Maps and
Graphs, OWASP Juice Shop, OWASP SAMM, OWASP projects, PSD2 and
GDPR, Security automation, Serverless, Threat modeling ...
ISACA Belgium
• The association focuses on assurance,
security, and governance and provides
globally recognised certification in
assurance (CISA), security (CISM), and
governance (CGEIT).
• Regular chapter meetings and events
8
https://engage.isaca.org/belgiumchapter
(ISC)² Belux chapter
• The (ISC)² Belux Chapter is the official
association of (ISC)² certified information
security professionals (CISP) in Belgium &
Luxembourg. It is also open to all security
professionals or security enthusiasts in
Belgium and Luxembourg.
• Regular chapter meetings
9
https://www.isc2chapter-belux.com/
LSEC
• international security cluster, a not for profit
organization that has the objective to promote
Information Security and the expertise in BeNeLux
and Europe.
• membership based
• regular events
• also together with CSA (cloud security alliance)
10
https://www.leadersinsecurity.org
https://cloudsecurityalliance.org/
Infosecurity
• ICT-exhibition Infosecurity.be combined with Data &
Cloud Expo in Brussels Expo
• Yearly expo in March
• Free access
• Good networking opportunities
11
https://www.infosecurity.be
Cyber Security Coalition
• The Cyber Security Coalition is a partnership
between players from the academic world, the public
authorities and the private sector to join forces in the
fight against cybercrime.
• Membership based
• Regular events
12
https://www.cybersecuritycoalition.be
CERT.be
• The federal Computer Emergency Response Team,
or CERT.be for short, is the operational service of the
Centre for Cyber Security Belgium (CCB). The task
of CERT.be is to detect, observe and analyse online
security problems, and to inform various target
groups accordingly.
• Contact in case of incident…
13
https://www.cert.be
Belgian Hackerspaces
• community-operated physical space where
people with common interests, often in
computers, technology, science, digital art or
electronic art, can meet, socialise and/or
collaborate.
• open community labs incorporating elements
of machine shops, workshops and/or studios
where hackers can come together to share
resources and knowledge to build and make
things.
14
https://hackerspaces.be/
https://hackeragenda.be
• Hackerspace.gent Ghent
• Brixel Hasselt
• HSBXL - Hackerspace Brussels
Brussels
• Instant City Harbour Hennuyeres
• Ko-Lab Mechelen (Antwerpen)
• Liege Hackerspace Liege
• Micro Factory Anderlecht
• OpenGarage Borsbeek
• UrLab Brussels
• Voidwarranties Deurne (Antwerpen)
• Walking Robot LAB Deurne
(Antwerpen)
• Zeus WPI Ghent
BruCON
• BruCON is an annual security and hacker conference
providing two days of an interesting atmosphere for
open discussions of critical infosec issues, privacy,
information technology and its cultural/technical
implications on society.
• Yearly trainings and conference (Ghent, October)
• Student tickets
15
https://www.brucon.org
Other nearby and further away
events
• FOSDEM (BE)
• SANS trainings
• Troopers (DE)
• Hack in the Box (NL)
• Hack.lu
• Hack in Paris
• 44CON (UK)
• Chaos Computer Club (CCC) (DE)
• DEF CON
• Black Hat
• RSA Conference 16
CyberWayFinder
• Empowering Women in Cyber Security
• CWF is an educational training with individualized
mentoring, so successful program ‘graduates’ exit
after three years as fully-certified mid-career
cybersecurity professionals
• also check out Women In AppSec
17
https://www.cyberwayfinder.com/
https://www.owasp.org/index.php/Women_In_AppSec
CyberSKool
• CyberSKool vzw organises a conference where we
teach kids (between the ages of 7 and 15) IT security
awareness, hacking (out of the box thinking and
problem solving) by doing STEM activities and IT
skills such as coding, hardware hacking, encryption,
general IT Security Awareness, etc. We make sure
that kids have fun while they learn these skills. We
give these exercises in Dutch, French and English.
18
https://cyberskool.org/
CoderDojoBelgium
• CoderDojo organizes free coding workshops (called
Dojo’s) for girls and boys from 7 to 18 years old. A
Dojo is entirely prepared and led by volunteers. If you
are older, then you can help out at an existing Dojo
or start your very own CoderDojo!
19
https://www.coderdojobelgium.be
Other channels
• InfoSec Belgium: https://github.com/cudeso/infosec-
belgium (Slack channel - invite only)
• Google Agenda: Information Security Events -
(Belgium)
https://calendar.google.com/calendar?cid=cnNrcTZ
0cTM2NnE2Zjk0bzg3cXJnaDdiODRAZ3JvdXAuY2
FsZW5kYXIuZ29vZ2xlLmNvbQ
• Groups on LinkedIn …
20
Volunteering makes you happier!
• connects you to others
• is good for your mind and body
• can advance your career
• brings fun and fulfillment to your life
21
Get involved
• Use and donate (feed)back!
• Attend meetings
• Contribute to projects
• Share knowledge
• Sponsor chapters / projects
• Become member
22
Thank you!
seba@toreon.com
seba@owasp.org
23

More Related Content

What's hot

Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Algiers
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
IISPEastMids
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsEdwin A. Opare
 
Startup advisory service
Startup advisory serviceStartup advisory service
Startup advisory service
Agence du Numérique (AdN)
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
 
Russian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business developmentRussian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business development
Thijs van Hofwegen
 

What's hot (7)

Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & Concepts
 
Startup advisory service
Startup advisory serviceStartup advisory service
Startup advisory service
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Russian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business developmentRussian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business development
 

Similar to Cyber Security Challenge Belgium - welcome to our belgian IT security community

AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
kantarainitiative
 
Star Wars - Coding Unplugged
Star Wars - Coding UnpluggedStar Wars - Coding Unplugged
Star Wars - Coding Unplugged
Brian Pichman
 
ISCRAM Summer School lecture Prof. Ralph Morelli
ISCRAM Summer School lecture Prof. Ralph MorelliISCRAM Summer School lecture Prof. Ralph Morelli
ISCRAM Summer School lecture Prof. Ralph Morelli
wjm
 
IDZ Diversity Meetup - Beatrice Fraedrich
IDZ Diversity Meetup - Beatrice FraedrichIDZ Diversity Meetup - Beatrice Fraedrich
IDZ Diversity Meetup - Beatrice Fraedrich
BeMyApp
 
EOSC-DIH: Bringing industry into the EOSC
EOSC-DIH: Bringing industry into the EOSCEOSC-DIH: Bringing industry into the EOSC
EOSC-DIH: Bringing industry into the EOSC
EOSC-hub project
 
2020 20-04 fiware i hubs committee meeting -midih-onestopshopmarketplace
2020 20-04  fiware i hubs committee meeting -midih-onestopshopmarketplace2020 20-04  fiware i hubs committee meeting -midih-onestopshopmarketplace
2020 20-04 fiware i hubs committee meeting -midih-onestopshopmarketplace
MIDIH_EU
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
Michael Sauers
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
Jennifer Koerber
 
FIWARE Global Summit - WAZIUP Initiative Cost-effective IoT for SDG2030
FIWARE Global Summit - WAZIUP InitiativeCost-effective IoT for SDG2030 FIWARE Global Summit - WAZIUP InitiativeCost-effective IoT for SDG2030
FIWARE Global Summit - WAZIUP Initiative Cost-effective IoT for SDG2030
FIWARE
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
WMG, University of Warwick
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
Deploy360 Programme (Internet Society)
 
I fab lab in fvg (dall'idea al progetto)
I fab lab in fvg (dall'idea al progetto)I fab lab in fvg (dall'idea al progetto)
I fab lab in fvg (dall'idea al progetto)
Carlo Fonda
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
NUS-ISS
 
Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023
Hal Speed
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
E Robertson
 
ION Costa Rica Opening Slides
ION Costa Rica Opening SlidesION Costa Rica Opening Slides
ION Costa Rica Opening Slides
Deploy360 Programme (Internet Society)
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
Shortcuts for digital literacy support v2
Shortcuts for digital literacy support v2Shortcuts for digital literacy support v2
Shortcuts for digital literacy support v2
Indianapolis Public Library
 
OpenSC: eID interoperability through open source software
OpenSC: eID interoperability through open source softwareOpenSC: eID interoperability through open source software
OpenSC: eID interoperability through open source softwareMartin Paljak
 

Similar to Cyber Security Challenge Belgium - welcome to our belgian IT security community (20)

AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Star Wars - Coding Unplugged
Star Wars - Coding UnpluggedStar Wars - Coding Unplugged
Star Wars - Coding Unplugged
 
ISCRAM Summer School lecture Prof. Ralph Morelli
ISCRAM Summer School lecture Prof. Ralph MorelliISCRAM Summer School lecture Prof. Ralph Morelli
ISCRAM Summer School lecture Prof. Ralph Morelli
 
IDZ Diversity Meetup - Beatrice Fraedrich
IDZ Diversity Meetup - Beatrice FraedrichIDZ Diversity Meetup - Beatrice Fraedrich
IDZ Diversity Meetup - Beatrice Fraedrich
 
EOSC-DIH: Bringing industry into the EOSC
EOSC-DIH: Bringing industry into the EOSCEOSC-DIH: Bringing industry into the EOSC
EOSC-DIH: Bringing industry into the EOSC
 
2020 20-04 fiware i hubs committee meeting -midih-onestopshopmarketplace
2020 20-04  fiware i hubs committee meeting -midih-onestopshopmarketplace2020 20-04  fiware i hubs committee meeting -midih-onestopshopmarketplace
2020 20-04 fiware i hubs committee meeting -midih-onestopshopmarketplace
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
 
FIWARE Global Summit - WAZIUP Initiative Cost-effective IoT for SDG2030
FIWARE Global Summit - WAZIUP InitiativeCost-effective IoT for SDG2030 FIWARE Global Summit - WAZIUP InitiativeCost-effective IoT for SDG2030
FIWARE Global Summit - WAZIUP Initiative Cost-effective IoT for SDG2030
 
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
TechSoup for Libraries: Sustaining Technology to Serve Your Patrons: Dec. 2010
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
I fab lab in fvg (dall'idea al progetto)
I fab lab in fvg (dall'idea al progetto)I fab lab in fvg (dall'idea al progetto)
I fab lab in fvg (dall'idea al progetto)
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
ION Costa Rica Opening Slides
ION Costa Rica Opening SlidesION Costa Rica Opening Slides
ION Costa Rica Opening Slides
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Shortcuts for digital literacy support v2
Shortcuts for digital literacy support v2Shortcuts for digital literacy support v2
Shortcuts for digital literacy support v2
 
OpenSC: eID interoperability through open source software
OpenSC: eID interoperability through open source softwareOpenSC: eID interoperability through open source software
OpenSC: eID interoperability through open source software
 

More from Sebastien Deleersnyder

Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
Sebastien Deleersnyder
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
Sebastien Deleersnyder
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
Sebastien Deleersnyder
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
Sebastien Deleersnyder
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!
Sebastien Deleersnyder
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
Sebastien Deleersnyder
 

More from Sebastien Deleersnyder (7)

Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
 
Support OWASP SAMM
Support OWASP SAMMSupport OWASP SAMM
Support OWASP SAMM
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Cyber Security Challenge Belgium - welcome to our belgian IT security community

  • 1. Welcome to our Belgian IT Security community Sebastien Deleersnyder, Toreon, OWASP CYBER SECURITY CHALLENGE BELGIUM 2019
  • 2. Building our cybersecurity community! 1. Our community 2. Volunteering
  • 3. OWASP • The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. • Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. 3 https://www.owasp.org
  • 4. OWASP Belgium • Regular chapter meetings • Yearly BeNeLux conference 4 https://www.owasp.org/index.php/Belgium https://twitter.com/owasp_be Google Groups: https://groups.google.com/a/owasp.org/forum/#!forum/belgium-chapter/join
  • 5. OWASP Projects 5 Tools Zed Attack Proxy Web Testing Environment Project OWTF Dependency Check Security Shepherd DefectDojo Project Juice Shop Project Security Knowledge Framework Dependency Track Project Code ModSecurity Core Rule Set OWASP CSRFGuard Documentation Application Security Verification Standard Software Assurance Maturity Model (SAMM) AppSensor Project Top Ten Project Testing Project
  • 6. open-security-summit.org Tracks on API Security, CISO, DevSecOps, Machine Learning, Maps and Graphs, OWASP Juice Shop, OWASP SAMM, OWASP projects, PSD2 and GDPR, Security automation, Serverless, Threat modeling ...
  • 7.
  • 8. ISACA Belgium • The association focuses on assurance, security, and governance and provides globally recognised certification in assurance (CISA), security (CISM), and governance (CGEIT). • Regular chapter meetings and events 8 https://engage.isaca.org/belgiumchapter
  • 9. (ISC)² Belux chapter • The (ISC)² Belux Chapter is the official association of (ISC)² certified information security professionals (CISP) in Belgium & Luxembourg. It is also open to all security professionals or security enthusiasts in Belgium and Luxembourg. • Regular chapter meetings 9 https://www.isc2chapter-belux.com/
  • 10. LSEC • international security cluster, a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe. • membership based • regular events • also together with CSA (cloud security alliance) 10 https://www.leadersinsecurity.org https://cloudsecurityalliance.org/
  • 11. Infosecurity • ICT-exhibition Infosecurity.be combined with Data & Cloud Expo in Brussels Expo • Yearly expo in March • Free access • Good networking opportunities 11 https://www.infosecurity.be
  • 12. Cyber Security Coalition • The Cyber Security Coalition is a partnership between players from the academic world, the public authorities and the private sector to join forces in the fight against cybercrime. • Membership based • Regular events 12 https://www.cybersecuritycoalition.be
  • 13. CERT.be • The federal Computer Emergency Response Team, or CERT.be for short, is the operational service of the Centre for Cyber Security Belgium (CCB). The task of CERT.be is to detect, observe and analyse online security problems, and to inform various target groups accordingly. • Contact in case of incident… 13 https://www.cert.be
  • 14. Belgian Hackerspaces • community-operated physical space where people with common interests, often in computers, technology, science, digital art or electronic art, can meet, socialise and/or collaborate. • open community labs incorporating elements of machine shops, workshops and/or studios where hackers can come together to share resources and knowledge to build and make things. 14 https://hackerspaces.be/ https://hackeragenda.be • Hackerspace.gent Ghent • Brixel Hasselt • HSBXL - Hackerspace Brussels Brussels • Instant City Harbour Hennuyeres • Ko-Lab Mechelen (Antwerpen) • Liege Hackerspace Liege • Micro Factory Anderlecht • OpenGarage Borsbeek • UrLab Brussels • Voidwarranties Deurne (Antwerpen) • Walking Robot LAB Deurne (Antwerpen) • Zeus WPI Ghent
  • 15. BruCON • BruCON is an annual security and hacker conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. • Yearly trainings and conference (Ghent, October) • Student tickets 15 https://www.brucon.org
  • 16. Other nearby and further away events • FOSDEM (BE) • SANS trainings • Troopers (DE) • Hack in the Box (NL) • Hack.lu • Hack in Paris • 44CON (UK) • Chaos Computer Club (CCC) (DE) • DEF CON • Black Hat • RSA Conference 16
  • 17. CyberWayFinder • Empowering Women in Cyber Security • CWF is an educational training with individualized mentoring, so successful program ‘graduates’ exit after three years as fully-certified mid-career cybersecurity professionals • also check out Women In AppSec 17 https://www.cyberwayfinder.com/ https://www.owasp.org/index.php/Women_In_AppSec
  • 18. CyberSKool • CyberSKool vzw organises a conference where we teach kids (between the ages of 7 and 15) IT security awareness, hacking (out of the box thinking and problem solving) by doing STEM activities and IT skills such as coding, hardware hacking, encryption, general IT Security Awareness, etc. We make sure that kids have fun while they learn these skills. We give these exercises in Dutch, French and English. 18 https://cyberskool.org/
  • 19. CoderDojoBelgium • CoderDojo organizes free coding workshops (called Dojo’s) for girls and boys from 7 to 18 years old. A Dojo is entirely prepared and led by volunteers. If you are older, then you can help out at an existing Dojo or start your very own CoderDojo! 19 https://www.coderdojobelgium.be
  • 20. Other channels • InfoSec Belgium: https://github.com/cudeso/infosec- belgium (Slack channel - invite only) • Google Agenda: Information Security Events - (Belgium) https://calendar.google.com/calendar?cid=cnNrcTZ 0cTM2NnE2Zjk0bzg3cXJnaDdiODRAZ3JvdXAuY2 FsZW5kYXIuZ29vZ2xlLmNvbQ • Groups on LinkedIn … 20
  • 21. Volunteering makes you happier! • connects you to others • is good for your mind and body • can advance your career • brings fun and fulfillment to your life 21
  • 22. Get involved • Use and donate (feed)back! • Attend meetings • Contribute to projects • Share knowledge • Sponsor chapters / projects • Become member 22