<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<meta content="text/html;charset=UTF-8" http-equiv="Content-Type">
<body bgcolor="#ffffff" text="#000000">
<h3><span class="mw-headline">Topic: Security in the Clouds </span></h3>
<p>Synopsis: This talk provides a brief overview of cloud computing,
and reveals the security risks of moving into the clouds. The concept
behind cloud computing is simple: use a hosting provider’s IT resources
to expand or shrink to meet your needs, and only for pay what you need
when you need it. This architecture appeals to many IT managers as it
reduces the initial startup costs, maintenance costs, and overhead
required to run systems. Got slashdotted? Not a problem. Your cloud
presence will seamlessly expand to push your business to the next
level. However, as with all new technology, there are inherent risks.
We will discuss the security risks with application code, architecture,
the runtime environment, and the development environment.
<p>Presenter: <b>Jon Rose</b>
<p>Jon Rose is a researcher and pentester within Trustwave's SpiderLabs
Jon has close to a decade of experience performing network and
application security assessments, including network penetration
blackbox application testing, and code reviews across a wide range of
programming languages and technologies. Jon has also led IT policy,
standards, and guideline projects, as well as providing IT security
remediation support for commercial and government clients. His security
expertise also includes creating enterprise security programs,
guidance in an enterprise security architect role, and building
into organizations existing software development lifecycle. </p>
<p>Jon also authored the Flex enumeration tool <a
href="http://deblaze-tool.appspot.com/" class="external text"
which he recently presented at Defcon 17. Also check out Jon's <a
href="http://codesearch0day.appspot.com/" class="external text"
on using Google CodeSearch to find vulnerabilities.
<span class="editsection"></span> <span class="mw-headline">Agenda </span>
<li> 6pm: Pizza & pop @ <a
rel="nofollow">Raytheon Polar Services</a>, courtesy of <a
href="http://www.fishnetsecurity.com/" class="external text"
title="http://www.fishnetsecurity.com/" rel="nofollow">FishNet Security</a>
<li> 6:30pm: Introduction and Chapter business
<li> 6:45pm --> 8pm: Presentation
Full details at <a class="moz-txt-link-freetext" href="http://www.owasp.org/index.php/Denver">http://www.owasp.org/index.php/Denver</a><br>
Looking forward to seeing you there!<br>
Twitter folks follow @owasp303 for appsec updates.<br>
Calendar invite forthcoming to track RSVP's.<br>
<pre class="moz-signature" cols="72">--
David W. Campbell
Open Web Application Security Project (OWASP)
<a class="moz-txt-link-abbreviated" href="mailto:email@example.com">firstname.lastname@example.org</a>
Visit us at <a class="moz-txt-link-abbreviated" href="http://www.owasp.org">www.owasp.org</a>