addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwchatcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscrosseditemptyheartfacebookfolderfullheartglobegmailgoogleimagesinstagramlinklocation-pinmagnifying-glassmailminusmoremuplabelShape 3 + Rectangle 1outlookpersonplusprice-ribbonImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruseryahoo

SSQA Monthly meeting

Learning from the enemy: Security Testing of Networked Applications

Security testing is taking its place alongside functional, usability and
performance testing. Customers want to know that your application is not
going to increase the vulnerability of their network. Releasing patches to fix
security issues discovered after release is expensive for you and your
customer.

Your application's security is going to be tested by many players. Hackers,
security companies and now governments will invest time, expend expert
effort and implement a certain kind of tool to discover weaknesses in it. If
there is an input weakness it will be discovered and sold back to your
company (if you are lucky) or simply released 'in the wild' if you are not.

In this presentation Aviram Jenik, CEO of Beyond Security, will discuss how
hackers find security weaknesses in products, and why you should
incorporate the same kind of tool into your testing process .
Learn how to identify and document previously
unknown (0-day) security problems or validate their absence and test
applications for common input vulnerabilities. Originally available only to
governments and military, commercial, well supported QA security tools are
now available to test and certify any networked software, even those with
proprietary protocols.

Bio:
Aviram Jenik is the co-founder and CEO of Beyond Security, a leading
developer of vulnerability assessment technologies. He is also the
co-founder of SecuriTeam.com, one of the largest security portals and
vulnerability databases on the Internet.
Mr. Jenik has a vast technical background, and his resume includes
contribution to several open-source security projects and active
research in the fields of vulnerability assessment, full disclosure
and protocol fuzzing. He frequently lectures and writes about advanced
aspects of the security field and is the co-author of the book "Open
Source Fuzzing"

Join or login to comment.

  • Alexander B.

    Please count me in.

    February 12, 2013

  • Alexander B.

    please count me in

    February 12, 2013

  • Kristel

    I'm coming from San Francisco... does anybody have a free spot left on their car?

    February 4, 2013

    • Kristel

      Hey Doug, I would really appreciate it.

      February 8, 2013

    • Kristel

      hey vineet, can you IM me your number? I'm taking the train.

      February 11, 2013

  • Viktor E.

    I'll attend.

    February 11, 2013

  • Anna

    Is it free seminar?

    February 8, 2013

58 went

Our Sponsors

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy