June 11, 2010


      Audio from the May NEOISF Meeting with Rafal Los

We just posted the audio from Rafal Los’ talk: Into the Rabbit Hole: Execution Flow-Based Web Application Testing.  The slide deck will be posted soon!  You can download the audio as a podcast below:



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



May 18, 2010


      May 19th NEOISF Meeting Announcement

Our next meeting is this WEDNESDAY May 19, 2010.  Pizza and networking start at 6:00 PM.  Talks start at 6:30 PM.  Location: Park Center Plaza #1, 6100 Oak Tree Blvd, off Rockside Road, Independence, Ohio.  Click here for a Google Map! Open to everyone and free as always!  Here are the list of talks and agenda items for this months meeting:

Into the Rabbit Hole: Execution Flow-Based Web Application Testing
Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface there is still much human analysis that must be done to find the elusive defects that lie just below the surface. That human analysis is daunting and irregular … until now. The answer is an execution-flow-based approach to application security testing. By first understanding application logic and execution flow it is possible to completely map a web application’s attack surface, and therefore fully test the application. Along the way, we will cover the principles of data-flow analysis, application process mapping and building execution-flow diagrams (EFDs), which together form a complete picture of the web application and allow an analyst to uncover potentially critical defects.

Speaker Bio
Senior Security Specialist and Web Application Security evangelist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs.

A Survey of Security Certifications:  Which Regex Should You Match?
The IT industry has long been a maze of myriad technology certifications, and the security industry is no different.  CISSP, CISA, CEH, GCIH, OSCP…you’ve seen the letters, and probably even have a few on your business card.  In this presentation, Chris will breakdown popular security certifications, categorizing them by both educational and resume-building value.

Speaker Bio
Chris Clymer is a senior security consultant for a Fortune 500 financial services institution, a co-host of the Security Justice podcast, and currently sits on the NEOISF board.  He’s been working hard on his cert regex in recent years, current patterns matched include: CISSP, CISA, GPEN, and GWAPT.

This months meeting is sponsored by HP.  Come early, at 6:00 PM, for pizza, pop, water and social networking with your peers.  We hope to see you there!



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



May 6, 2010


      SANS (SEC503) Intusion Detection In-Depth in Cleveland June 24th

Starting June 24th,  SANS will be running Intrusion Detection In-Depth in Cleveland, OH.  This course will be taught by SANS Mentor and NEOISF member Steve Jaworski.   Steve will show you practical hands-on intrusion detection and traffic analysis, network traces and analysis tips.

The emphasis of this course is on increasing students’ understanding of the workings of TCP/IP, methods of network traffic analysis, and one specific network intrusion detection system (NIDS) – Snort. This is not a comparison or demonstration of multiple NIDSs. Instead, the knowledge provided here allows students to better understand the qualities that go into a sound NIDS and the whys behind them, and thus, to be better equipped to make a wise selection for their site’s particular needs.

For complete event details visit http://www.sans.org/info/58593.

When: June 24 – August 26, 2010 (Class meets once a week from 6:30-8:30PM on Thursdays)
Course: Security 503: Intrusion Detection In-Depth
Mentor: Steve Jaworski
CPEs: 36
GIAC Certification: GIAC Certified Intrusion Analyst (GCIA). This course prepares meets the requirement of the DoD 8570 IAT Level III. http://www.sans.org/8570/
Tuition: Save $400 when you register by May 27 at http://www.sans.org/info/58593
For group discounts please contact mentor@sans.org.

What is the SANS Mentor Program
The SANS Mentor Program offers you local, live training over the course of ten weeks.  This format allows students to understand, apply and digest the material each week and return with any questions at the next class session.  Mentor classes are small classes averaging less than 12 students which gives students the opportunity to directly interact with each other and the Mentor in a hands-on environment.

With local training from SANS Mentor  you save on travel expenses, time away from work, family and save on average 25% on the tuition
cost.  If you have a limited training budget this SANS Mentor class will get you the knowledge you need at savings you can use.  If this sounds like the kind of local, live training you can use please register today at http://www.sans.org/info/58593.



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



April 30, 2010


      Rafal Los from HP Speaking at the May 19th Meeting

We are excited to announce that Rafal Los from HP will be speaking at the May 19th meeting.  He will be giving his talk from the Source Boston conference “Into the Rabbit Hole: Execution Flow-Based Web Application Testing”.  Here is the talk abstract and his bio:

Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface there is still much human analysis that must be done to find the elusive defects that lie just below the surface. That human analysis is daunting and irregular … until now. The answer is an execution-flow-based approach to application security testing. By first understanding application logic and execution flow it is possible to completely map a web application’s attack surface, and therefore fully test the application. Along the way, we will cover the principles of data-flow analysis, application process mapping and building execution-flow diagrams (EFDs), which together form a complete picture of the web application and allow an analyst to uncover potentially critical defects.

Speaker Bio:
Senior Security Specialist and Web Application Security evangelist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting. For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs.

Stay tuned for the full agenda announcement in the next few days!  We hope to see you May 19th!



del.icio.us|Digg|Furl|ma.gnolia|RawSugar|reddit|Spurl|Google|StumbleUpon



« Newer PostsOlder Posts »

Local Security Jobs @ our LinkedIn Group!


Support our Sponsors:


Visit our friends: