Discussing Application Security in Washington DC
Abstract: Managing the risk surrounding the 3rd party supply chain presents unique challenges for Enterprises, Vendors/Suppliers, and Application Security Partners. As... Learn more
"Enumerating software security design flaws throughout the SSDLC"
BIO John M. Willis is a Senior Information Security Architect with a history of electronics engineering, programming, and configuration management. John’s first computer... Learn more
"Identifying Compromised Web Applications with Burpsuite and Yara"
Abstract: Burpsuite is a modular, Java-based web application assessment tool. Yara is a sophisticated searching and pattern matching tool that is commonly used for... Learn more
OWASP DC & NoVA Spring Social
The nice Spring weather is upon us and we have decided to have a Spring Social with the OWASP NoVA Chapter. We will get to meet our peers from the other side of the... Learn more
Integrating Compliance into the Development Process
Abstract Everyone wants to move faster and ship updates with higher velocity. Regulatory burdens and compliance can add extra drag on the system. Controls that live in... Learn more
Encryption in the Age of Breaches
Abstract As recent breaches have shown, most of the sensitive data breached was stored in clear text - not encrypted. However, things are changing fast and organizations... Learn more
- See all past Meetups