This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Madison
OWASP Madison, Wisconsin
Welcome to the Madison, Wisconsin chapter homepage. The chapter leader is Lance Rudolph.
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Local News
The group is active and is now planning to meet each month on the last Wednesday of the month.
Our first meeting in a long time will be held at: Sprecher's Restaurant and Pub, 1262 John Q Hammons Dr, Madison, WI 53717 on April 26 from 3:00pm to 5:00pm This will be the first meeting of the chapter in a while, so we will have a hands on introduction to ZAP, bring a laptop that can run a VM if you want to follow along, and we will determine what topics we will want in the upcoming meetings.
May 2017 meeting
Sprecher's Restaurant and Pub, 1262 John Q Hammons Dr, Madison, WI 53717
May 31 from 3:00pm to 5:00pm
We will have a demonstration of the SWAMP static code review program.
June 2017 Meeting Tentative
We are tentatively going to have a demonstration on how to buffer overflow an application. Following the buffer overflow, the next step is to build a working exploit
Everyone is welcome to join us at our chapter meetings.