[OWASP-Portland] May chapter meeting 5/22 6 PM @ Jama Software - a panel discussing "Pen Testing: How to Get Bigger Bang for your Buck"
sonnypdx at gmail.com
Wed May 16 19:52:14 UTC 2018
Nice work Ian, Brian, Philip, Bhushan and Benny in pulling this off. It
sure looked like a lot of coordination went into putting this together.
On Wed, May 16, 2018 at 11:16 AM, Ian Melven <ian.melven at gmail.com> wrote:
> The May chapter meeting is 5/22 at 6 PM at Jama Software, 135 SW Taylor
> Suite 200, Portland, Oregon 97204
> A panel will take on the subject of "Pen Testing: How to Get Bigger Bang
> for your Buck", including your questions:
> Panel Discussion - Join local industry practitioners as they discuss the
> best practices used in getting superior results from your Pen Testing. Also
> share your ideas on Dos and Dont's of Pen testing.
> Moderator - Brian Ventura
> Panelists - Alexie Kojenov, Ian Melven, Benny Zhao, and Scott Cutler
> Alexei Kojenov is a Senior Application Security Consultant with years of
> prior software development experience. During his career with IBM, he
> gradually moved from writing code to breaking code. Since late 2016, Alexei
> has been working as a consultant at Aspect Security, helping businesses
> identify and fix vulnerabilities and design secure applications. Aspect
> Security was recently acquired by Ernst&Young and joined EY Advisory
> cybersecurity practice.
> Ian Melven is Principal Security Engineer at New Relic. He has worked in
> security for almost 20 years, including roles at Mozilla, Adobe, McAfee and
> Benny Zhao is a Security Engineer at Jive Software. His experience focuses
> on identifying code vulnerabilities and securing software by building tools
> to help automate security testing.
> Scott Cutler has been interested in computer security since he was a kid,
> and started attending DefCon in 2004. He got his Computer Science degree
> from UC Irvine in 2009 while working for the on-campus residential network
> department for 4 years. After graduating he worked first as QA for a SAN
> NIC card manufacturer, then switched to essentially create their DevOps
> program from scratch. From these jobs he has gained a lot of experience
> with networking, build processes, Linux/Unix administration and scripting,
> and Python development. In 2012 Scott began working in the security field
> full time as a FIPS, Common Criteria, and PCI Open Protocol evaluator for
> InfoGard Laboratories (now UL Transaction Security). During this time he
> got his OSCP and a good understanding of federal security requirements,
> assessment processes, and documentation (ask him about NIST SPs!). In 2015
> scott switched over to Aspect Security (now EY) to put his OSCP to good use
> and became a full-time application security engineer, doing pen-tests as
> well as developing both internal and external training.
> More details at http://calagator.org/events/1250473728
> OWASP-portland mailing list
> Please contact owasp-portland-owner at lists.owasp.org prior to posting any
> A sincere thanks to our chapter supporters:
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the OWASP-portland