OWASP San Diego – Jeremiah Grossman To Present: Top Ten Web Hacking Techniques

Free invitation to attend San Diego's next OWASP meeting. Snack on Sushi and Sake while learning best practices for secure web application development.
May 31, 2011 - PRLog -- The Open Web Application Security Project (OWASP) Chapter in San Diego is holding a meeting to discuss the latest developments in the OWASP organization and new ideas in leading-edge secure web development. Join us in welcoming Jeremiah Grossman to present details of the many notable and new web hacking techniques revealed in 2010, as well as some of the prevalent security issues emerging in 2011. Attendees will be treated to a step-by-step guided tour of the newest threats targeting today's corporate websites and enterprise users. Enjoy Sushi and Sake refreshments from our friends at Whitehat Security as you network with some of the best security auditors, researchers, and developers in the San Diego area.  We look forward to seeing you there!

Date:        June 14th, 2011
Time:        6:00pm - 8:00pm
Location: 10240 Sorrento Valley Rd
                 San Diego, California  92121

Please RSVP: rsvp@owasp-sd.org

About OWASP:
The Open Web Application Security Project (OWASP.ORG) is a non-profit community devoted to improving focus on application security. OWASP continues to grow and deliver exceptional resources to security conscious individuals who are required to make informed decisions about true application security risks. A plethora of funded open-source products, new coding principals that have been adopted by PCI standards, and a unique list of involved security professionals make OWASP an invaluable forum to attend.
Source:OWASP San Diego
Email:***@owasp-sd.org Email Verified
Tags:Owasp, Security, Infosec, Web, Application, San Diego, Developer, Jeremiah Grossman, Internet, Top 10, Whitehat, Hacking
Industry:Security, Computers, Internet
Location:San Diego - California - United States
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse

Like PRLog?
Click to Share