Darian Anthony Patrick on 16 Aug 2010 20:52:19 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] Fwd: [OWASP-Philadelphia] Next Meeting - Tuesday August 17th 6:30-8:00

  • From: Darian Anthony Patrick <darian@criticode.com>
  • To: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
  • Subject: [PLUG] Fwd: [OWASP-Philadelphia] Next Meeting - Tuesday August 17th 6:30-8:00
  • Date: Mon, 16 Aug 2010 23:52:10 -0400
  • Dkim-signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=message-id :date:from:mime-version:to:subject:content-type; s=sasl; bh=7+tE 7LjlB19y2sZtOdhrJqIWjJ8=; b=Ohwo1NjzuTP4BzDOKy4L4r1pY0/nlPURRb+j tPA3yODQZYO7+jeaAyoen9EkpmR+t5R1hkVxABRi1eNvyPjNBT0PqwzLRMyXNuIn yQrNwwZkvSvVHPSnJ1ZvwPbmSo0URkf1uyquPY3Kf9ws+ww38T9KQ+86tbwQipPJ Yf/xCbs=
  • Openpgp: id=F580E087
  • Reply-to: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
  • Sender: plug-bounces@lists.phillylinux.org

Just a heads up (and sorry for the late notice). The next Philly OWASP
meeting is tomorrrow evening at 6:30 at U. Penn.

-------- Original Message --------
Subject: 	[OWASP-Philadelphia] Next Meeting - Tuesday August 17th 6:30-8:00
Date: 	Tue, 10 Aug 2010 21:16:13 -0600
From: 	Aaron Weaver <aaron.weaver2@gmail.com>
Reply-To: 	owasp-philadelphia@lists.owasp.org
To: 	owasp-philadelphia@lists.owasp.org

Hi all - our next meeting is on Tuesday, hope to see you there. Please
extend the invite to your colleagues, and students. Registration is not
required for this meeting.

*When**: *Tuesday, August 17th, from 6:30 - 8:00 PM
*Where:* University of Pennsylvania, 307 Levine Hall, Philadelphia
Mobile App Security Techniques*

Look left, look right, look in your pocket, you probably glanced over a
cellular phone. These devices are getting more and more pervasive in
today's society. More importantly they are getting very powerful. This
new market of software users have been the catalyst of the "app" boom.
Everyone is jumping on board and developing mobile applications. This
influx of mobile application development means there are a large number
of mobile applications that get rushed to the market before they can be
properly reviewed from a security standpoint. So guess what, more bugs
for the taking!

In this talk we will lay out a few basic techniques that we use when we
perform mobile application assessments, highlight possible pit falls
that one should be aware and hopefully give those up and coming mobile
application penetration testers a leg up on the competition.

*Raj Umadas* is a Consultant with the Intrepidus Group. Mr. Umadas
graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a
BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly
expansive computer security curriculum. He is just as comfortable
sniffing out a memory corruption bug as he is assessing the risk
management decisions of large projects.

Coupled with Mr. Umadas' fresh academic outlook on security, he obtained
a no-nonsense business sense of security while working in an Information
Risk Management arm of a large investment bank. Corporate governance,
segregation of duties, and SOX compliance were all daily concerns for
Mr. Umadas.

Mr. Umadas is eager to establish his own niche in the security world
where he will be the catalyst of some very major innovation. With his
strong academics, proven real world experience, and never-say-no
attitude; it is only a matter of time.

OWASP-Philadelphia mailing list

Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug