OWASP Cambridge 2 nd December 2014. Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.

Slides:



Advertisements
Similar presentations
Don’t Teach Developers Security Caleb Sima Armorize Technologies.
Advertisements

OWASP Web Vulnerabilities and Auditing
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
A Demo of and Preventing XSS in.NET Applications.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Solving Real-World Problems with an Enterprise Security API (ESAPI) Chris Schmidt ESAPI Project Manager ESAPI4JS Project Owner Application Security Engineer.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Glass Box Testing: Thinking Inside the Box Omri Weisman Manager, Security Research Group IBM Rational.
2013 AppSec Guide and CISO Survey: Making OWASP Visible to CISOs Marco Morana, Member of OWASP London, Project Lead of the OWASP, CISO Guide Tobias Gondrom,
OWASP London 18 th September Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.
Workshop 3 Web Application Security Li Weichao March
“The cost of cybercrime is greater than the combined effect on the global economy of trafficking in marijuana, heroin and cocaine”|
OWASP Zed Attack Proxy Project Lead
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Copyright 2008 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security testing of study information system Security team: Matis Alliksoo Alo Konno Urmo Lihten Taavi Podzuks Sander Saarm.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Trifecta – Overview of Vulnerabilities in the Racing Industry Gus Fritschie December 11, 2013.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Update Seba Deleersnyder BE Board OWASP Belgium Chapter Meeting 17-Dec-2013.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Top 10 from a developer’s perspective John Wilander, OWASP/Omegapoint, IBWAS’10.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
OWASP Update Seba Deleersnyder BE Board OWASP Belgium Chapter Meeting 12-Feb-2014.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Snakes and Ladders OWASP Newcastle 24 th November 2015.
Deconstructing API Security
Securing Java Applications
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
//ALPHA.1 OWASP Knoxville Application Security Then and Now. Make a Difference Now 2015 June 11 Phil Agcaoili.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
OWASP London 4 th December Agenda Networking, food and refreshments Welcome Justin Clark Offensive OSINT Christian Martorella and Zigor Zumalde.
Defending Applications Against Command Insertion Attacks Penn State Web Conference 2003 Arthur C. Jones June 18, 2003.
SnowFROC Front Range OWASP Conference February 18 th, 2016.
Ken De Souza KWSQA, April 2016 V. 1.0
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Web Application Vulnerabilities
An Introduction to Web Application Security
Security Autodesk DevDays rEvolution
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
Canberra OWASP Chapter meeting
OWASP Leeds OWASP Leeds Chapter OWASP Leeds
Penetration Testing following OWASP
Finding and Fighting the Causes of Insecure Applications
Relevance of the OWASP Top 10
1. ASSOCILATE DEGREE PROGRAM Application Attacks SUBMITTED TO: Fatima Ashiq SUBMITTED By: University Of Central Punjab Farooq Sardar (V1F16ASOC0012) Adnan.
OWASP BOD Meeting 24 January
CompTIA Security+ Study Guide (SY0-501)
OWASP in favor of a more secure world
Oklahoma City.
Canberra OWASP Chapter meeting
Finding and Fighting the Causes of Insecure Applications
WELCOME Welcome to NYC Welcome to OWASP Welcome to AppSec USA 2013!
Presentation transcript:

OWASP Cambridge 2 nd December 2014

Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John Smith Anatomy of a Data Breach Joe Pelletier OWASP Roundup Colin Watson Networking

OWASP Roundup Past conferences Project updates AppSec EU 2015 Supporters Close

Past AppSec Conferences AppSec EU June, Cambridge UK AppSec USA September, Denver USA

Testing Guide Version 4 17 th September sting_Project

Proactive Controls Version 1 10 th March oactive_Controls

AppSensor Website 11 th September Reference implementation 13 th September 2014 v2.0.0 beta s/tag/v2.0.0-beta

Dependency Checker Version th November k/

Web Goat Version th September

Cyber Security Week OWASP London Cyber Security Week Workshops, talks and hackathon Startup focus Free to all Held at Google and UCL January 2015

AppSec EU 2015 Envisioned program 4 applied talk tracks: Builder, Breaker, Defender, CISO 1 research track May 2015 Amsterdam RAI The Netherlands

London Chapter Supporters

Thank You Speakers John Smith Joe Pelletier Chapter Leaders Justin Clarke Tobias Gondrom Hosts for this evening Skype Attendees

OWASP Volunteers Project leaders Project contributors Chapter leaders Members Corporate supporters Individual members Other supporters

Corporate Sponsors

Something Different Top Ten Risks 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards Top Ten Proactive Controls 1.Parameterize Queries 2.Encode Data 3.Validate All Inputs 4.Implement Appropriate Access Controls 5.Establish Identity and Authentication Controls 6.Protect Data and Privacy 7.Implement Logging, Error Handling and Intrusion Detection 8.Leverage Security Features of Frameworks and Security Libraries 9.Include Security-Specific Requirements 10.Design and Architect Security In

Another Game

Snakes and Ladders

Mobile Apps Too

Print Your Own Adobe PDF A2 print quality Adobe Illustrator Source Web Applications DE, EN, ES, FR, JA, ZH Mobile Apps EN, JA

Staying in Touch Chapter page Mailing list TwitterFacebook Elsewhere in the UK Birmingham, Bristol, Cambridge, East Midlands, Leeds, Manchester, Newcastle, Royal Holloway, Scotland, South Wales, Suffolk

The Melton Mowbray 18 Holborn