—< NORTHEAST OHIO INFORMATION SECURITY FORUM MEETING —< Wednesday December 15, 2010 —< 6:30 PM – 8:00 PM —< Pizza and social start 6:00 PM —< Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road, Independence, Ohio —< Open to everyone and free as always The Northeast Ohio Information Security Forum will meet for its monthly meeting on Wednesday January 19, 2010 starting at 6:30 PM. It will be held in the lower level of the Park Center Plaza #1 building (in the large room on lower level) off of Rockside Road in Independence. I’ve included links to maps and directions in this email. We have two talks planned… +++ What the FOCA – Chris Murrey, SecureState +++ Vulnerabilities in Third Party Web Applications – Gary McCully, SecureState See bottom of email for talk abstracts. PRIZES! Did we get your attention? We plan to have some prize giveaways as well. Don’t forget to come early, starting at 6:00 PM, for pizza and pop. Another great meeting from NEO Info Sec Forum – we hope to see you there! – NEOISF Board – ============================================================ [Location] Park Center Plaza 1 6100 Oak Tree Blvd Google maps link: TinyURL link http://tinyurl.com/neoisfmtg [Directions] 1. I-77 2. Rockside Road exit 3. West on Rockside Road 4. 2nd light go South onto Oak Tree Blvd 5. Pull into the 3rd driveway on the right 6. Go to lower level Signs will be posted on the building. ============================================================ TALK ABSTRACTS Title: What the FOCA – Chris Murrey, SecureState In this presentation, Chris Murrey of SecureState will provide a detailed overview of FOCA, a tool for extracting metadata as well as discovery of systems. Attendees will leave with a thorough understanding of the tool, including proper use. Chris Murrey’s BIO: As a member of SecureState’s Profiling Team, Chris Murrey is passionate about the role he plays in ethical hacking. Mr. Murrey performs technical security assessments on a weekly basis, specifically Web Application Security Assessments and External Penetration Tests. An Offensive Security Certified Professional and Microsoft Certified Systems Administrator, Mr. Murrey previously worked in the IT sector for a Cleveland printing company and as a “jack of all trades” for a multi-million dollar corporation. Title: Vulnerabilities in Third Party Web Applications, Gary McCully It’s a third party web application. . . Of course it’s secure. They have a whole team of people who thoroughly test their software before it’s released to the public.” Many organizations are installing third party web applications in their production environment without subjecting the applications to a formal web application security assessment. These organizations assume that third party software is more secure than the web applications that are internally designed. All web applications, whether they are third party or not, should go through a formal web application security review before they are placed in the production environment. To illustrate the risks of installing an insecure third party web application, Gary McCully will walk through a series of vulnerabilities he has found in a third party web application which can lead to remote code execution on the underlying operating system. Gary's BIO: Gary McCully is a Security Consultant on SecureState’s Profiling Team. At SecureState, Mr. McCully performs Vulnerability Assessments, War Dialing, Firewall Reviews, Penetration Tests, Physical Penetration Tests, and Web Application Security Reviews. Mr. McCully recently passed the CISSP certification exam, establishing himself as an (ISC)2 Associate. Passionate about expanding his knowledge and expertise, Mr. McCully’s research interests include the discovery and exploitation of buffer overflows, lock picking, and SSL vulnerabilities. Before joining SecureState, Mr. McCully worked as a Security Analyst at National City Bank, where he was responsible for the corporate usage compliance program, and offshore user access. Mr. McCully also worked with technical teams to ensure software was implemented with proper security controls, and assisted with the Vendor Security Review Program.
- NEOISF: Navigation
- Pages:
- Archives:
- April 2023
- November 2022
- October 2022
- September 2022
- June 2022
- July 2021
- April 2021
- March 2020
- February 2020
- January 2020
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- August 2018
- July 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- November 2017
- October 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- November 2016
- October 2016
- August 2016
- June 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- October 2015
- September 2015
- July 2015
- June 2015
- May 2015
- March 2015
- February 2015
- December 2014
- November 2014
- October 2014
- September 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- December 2012
- November 2012
- October 2012
- July 2012
- June 2012
- May 2012
- March 2012
- February 2012
- January 2012
- December 2011
- August 2011
- June 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- RSS Feed
March 15, 2011
NEOISF Meeting March 16, 2011
Comments Off on NEOISF Meeting March 16, 2011
Posted by relik @ 2:54 pm