[Owasp-rochester-announce] September meeting with Jeff Williams, Sep 22nd, 6pm at Bryant & Stratton

Andrea Cogliati andreac at dollos.it
Wed Sep 17 14:35:15 EDT 2008


September meeting will be held on Monday September 22nd, 6pm at Bryant 
& Stratton College and will feature a videoconference with Jeff 
Williams, world famous webappsec guru, on verb tampering, EASPI 
library and the future of OWASP. You can't miss this one!


Presenter: Jeff Williams
Topic: Verb tampering and ESAPI

Bio:

Jeff Williams is one of the major contributors in webappsec community. 
He has written many whitepapers, spoken at many conferences including 
Secure Software Summit, OWASP conferences, ISSA InfoSec Conference, 
NSA High Confidence Software and Systems Conference (HCSS), JavaOne, 
National Computer Security Conference (NCSC), etc, worked on several 
projects and written many tools available at OWASP (including creating 
the OWASP Top 10, WebGoat, Stinger, Secure Software Contract Annex, 
Honeycomb Project and the Enterprise Security API). Jeff has done a 
lot of work in promoting awareness of web application security. He's 
CEO of Aspect Security and also volunteers as chairs of OWASP 
Foundation. You can find more about him here:
http://myappsecurity.blogspot.com/2007/03/reflection-on-jeff-williams.html.


Abstract:

What is ESAPI?
The ESAPI is a free and open collection of all the security methods 
that a developer needs to build a secure web application. You can just 
use the interfaces and build your own implementation using your 
company's infrastructure. Or, you can use the reference implementation 
as a starting point. In concept, the API is language independent. 
However, the first deliverables from the project are a Java API and a 
Java reference implementation. Efforts to build ESAPI in .NET and PHP 
are already underway.

Why ESAPI?
Unfortunately, the available platforms, frameworks, and toolkits (Java 
EE, Struts, Spring, etc...) simply do not provide enough protection. 
This leaves developers with responsibility for designing and building 
security mechanisms. This reinventing the wheel for every application 
leads to wasted time and massive security holes.
The cost savings through reduced development time, and the increased 
security due to using heavily analyzed and carefully designed security 
methods provide developers with a massive advantage over organizations 
that are trying to deal with security using existing ad hoc secure 
coding techniques. This API is designed to automatically take care of 
many aspects of application security, making these issues invisible to 
the developers.


Attendance to the meeting is free and open to anyone.

See you there,

Andrea

===========
The third Rochester Security Summit will be held on October 29-30. Go 
to http://rochestersecurity.org/ web site to explore the agenda. 
Registration is open and early bird discount has been extended to 
September 30th!


More information about the Owasp-rochester-announce mailing list