This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Ottawa"

From OWASP
Jump to: navigation, search
(Chapter Leadership: Added Paul)
 
(54 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa]  
+
{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@owasp.org Sherif Koussa]
  
+
The Chapter leaders are:<br/>
<b>Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]</b><br>
+
[mailto:[email protected] Sherif Koussa] <br/>
 
+
[mailto:[email protected] Paul Ionescu] <br/>
<paypal>Ottawa</paypal>  
+
[mailto:[email protected] Garth Boyd] <br/>
 +
<br/>
 +
Chapter Board Member: <br/>
 +
[mailto:[email protected] Tanya Janca]
 +
<br/>
 +
<br/>
 +
<b>Join our [https://www.meetup.com/OWASP-Ottawa/ MeetUp]!<br>
 +
Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]<br>
 +
Talk to us on [https://owaspottawa.slack.com Slack]<br>
 +
</b>
  
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}}  
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}}  
  
<br>
 
 
==Thanks to Our 2013 Sponsor==
 
{| width="900" border="0" align="left" cellpadding="1" cellspacing="1"
 
[[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]]
 
|}
 
 
 
<br>
 
 
==Your Local Chapter==
 
==Your Local Chapter==
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:[email protected] Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:[email protected] Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].
+
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email us: [mailto:[email protected] Sherif], [mailto:tanya.janca@owasp.org Tanya] or [mailto:garth.boyd@owasp.org Garth]
 
 
Hope to see you at a meeting soon.
 
 
 
<br>
 
 
 
 
 
== What's Hiding in Your Software Components?==
 
 
 
'''What'''
 
 
 
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.
 
 
 
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development.
 
 
 
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.
 
 
 
'''Who'''
 
 
 
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.
 
 
 
 
 
'''When''': Thursday, Sept 5ht, 2013 : 6:00 PM
 
 
 
==Countermeasure 2013==
 
{|
 
|[[Image:cmeasure2013.jpg|400x200px|cmeasure2013.jpg|link=http://www.countermeasure2013.com/]]
 
|COUNTERMEASURE is Ottawa's premier annual IT security conference and training event featuring the best of both offensive and defensive tactics. Past speakers have included globally recognized industry security researchers, Government of Canada representatives and seasoned enterprise security experts from the private sector.
 
OWASP Ottawa is offering a 10% discount on Countermeasure 2013 registration for all OWASP members. Just e-mail one of the chapter members with your OWASP membership number or DM us @OWASP_Ottawa and we will send you the discount code.
 
|}
 
 
 
<br>
 
<br>
 
<br>
 
= Upcoming  Event Ideas =
 
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:[email protected] Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].
 
<br>
 
*<del>N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)</del>
 
*Secure Code review
 
*(ISC)2 CSSLP introduction
 
*Metasploit introduction
 
*Web Application Forensics
 
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)
 
*HTML5 - What's new for security specially for Offline Applications
 
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion
 
*ASP.NET MVC Security for WebForms Developers
 
*Hack proofing your web application by using reverse engineering
 
*Using Windows Communication Foundation (WCF) Securely in your applications
 
 
 
= Past Meetings =
 
====June 2013====
 
'''Title:'''China: All up in your business - Annoying Persistent Threat edition
 
 
 
'''What'''
 
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.
 
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!
 
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.
 
 
 
'''Who'''
 
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).
 
 
 
'''Slides'''
 
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]
 
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]
 
 
 
 
 
====May 2013====
 
'''Title:''' Ottawa IT Camp 2013
 
 
 
'''What'''
 
Ottawa IT Camp is a fun filled day of "meat only" presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.
 
 
 
 
 
'''Slides'''
 
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]
 
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]
 
 
 
 
 
====January 2013====
 
'''Title:''' XML Attack Surface
 
 
 
'''What'''
 
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers.
 
 
 
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.
 
 
 
'''Who'''
 
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues.
 
 
 
'''Slides'''
 
[http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]
 
 
 
 
 
====December 2012====
 
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime
 
 
 
'''What'''
 
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.
 
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.
 
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.
 
 
 
'''Who'''
 
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.
 
 
 
'''Slides'''
 
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]
 
 
 
====N00bs Night: Secure Code Review====
 
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.
 
 
 
'''What'''
 
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)
 
 
 
'''Who'''
 
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).
 
 
 
====May 2012====
 
'''Title:''' OWASP Tutorial Night: Threat Modeling Express
 
 
 
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.
 
 
 
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.
 
 
 
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]
 
 
 
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event.
 
 
 
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here]
 
 
 
==== December 12, 2011  ====
 
'''Location:''' Bell Canada - 160 Elgin St, Ottawa <br> <br>
 
 
 
'''Title:''' n00bs night out...exploiting the owasp top 10
 
 
 
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/
 
 
 
'''Who:''' all skill levels are welcome (especially n00bs)
 
 
 
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)
 
 
 
'''RSVP:''' http://n00bs-night.eventbrite.com/
 
 
 
==== September 27th, 2011  ====
 
 
 
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace)
 
 
 
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here]  
 
 
 
'''Microsoft Silverlight Security - A Hacker's Perspective'''
 
 
 
'''Abstract'''
 
 
 
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications.
 
 
 
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks.
 
 
 
'''Speakers:'''
 
 
 
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at [email protected]
 
 
 
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at [email protected]
 
 
 
<br>
 
 
 
==== May, Thursday 12th 2011  ====
 
 
 
'''Location:''' Bell - 160 Elgin St, Ottawa <br> <br> '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' <br> As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. <br>
 
 
 
<br> '''About The Speaker'''
 
 
 
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp; public sectors &amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp; contributions fraud, corruption investigations &amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp; compliance consulting.
 
 
 
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. <br> <br> '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner'''
 
 
 
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing.
 
 
 
<br> '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. <br>
 
 
 
==== March, Thursday 10th 2011  ====
 
 
 
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure.
 
 
 
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business.
 
  
==== More Previous Meetings  ====
+
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/<br>
  
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here]
+
<meetup group="OWASP-Ottawa" />
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here]
 
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here]
 
*[[November 28th, 2007 - Eric Klien - Make my day]]
 
  
= Chapter Leadership  =
+
== Chapter Leadership  ==
  
Chapter President: [mailto:[email protected] Sherif Koussa]&nbsp;
+
The Chapter leaders are  [mailto:[email protected] Sherif Koussa], [mailto:[email protected] Paul Ionescu], [mailto:tanya.janca@owasp.org Tanya Janca] and
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&nbsp;
+
[mailto:garth.boyd@owasp.org Garth Boyd]
  
 +
Organization Committee: Paul Ionescu, Pierre Ernst, Nancy Gariche, Rick Mitchel, Adam Janzen, David Petrasovic, Annie Fry, Oliver, Mark Tse<br>
  
<br>
+
=== Slides from the Previous Meeting: ===
<br>
+
Threat Modeling Toolkit - Jonathan Marcil - [https://www.owasp.org/images/0/02/Threat_Modeling_Toolkit_-_OWASP-ottawa-publish.pptx Slides]
__NOTOC__ <headertabs />
 
  
 
[[Category:Canada]]
 
[[Category:Canada]]

Latest revision as of 13:38, 22 October 2018

OWASP Ottawa

Welcome to the Ottawa chapter homepage. The chapter's president is Sherif Koussa.

The Chapter leaders are:
Sherif Koussa
Paul Ionescu
Garth Boyd

Chapter Board Member:
Tanya Janca

Join our MeetUp!
Follow us on Twitter
Talk to us on Slack


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Your Local Chapter

Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email us: Sherif, Tanya or Garth

For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/

Chapter Meetings

Visit our group on meetup.com

Upcoming events

  • Mar 30, 2024 (10:30): OWASPOttawa 2024 Capture the Flag (CTF)150 Louis-Pasteur Private, 150 Louis-Pasteur Private · Ottawa, ON**Welcome to our in Person CTF at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 564 On March 30th #OWASP #Ottawa will hold our all levels Capture The Flag (CTF) at UofO STEM Rm 564. This is a free ticketed event due to space restrictions. **You must have a ticket to enter.** One ticket per person. Join us for some learning and some fun. ** (read more)
See all upcoming events on meetup.com

Past events

  • Feb 21, 2024 (18:00): OWASPOttawa February 21st 2024: K8s:Insecure by Default, and what to do about it150 Louis-Pasteur Private, 150 Louis-Pasteur Private · Ottawa, ON**Welcome to our in Person Meetup at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 564 **Live Stream**: We will continue to Live Stream on our YouTube channel. (https://www.youtube.com/@OWASP_Ottawa). Subscribe to our YouTube channel, set a reminder and you’ll get a notification as soon as we go live! **YouTube Live Stream Link**: https: (read more)
  • Jan 17, 2024 (18:00): OWASP Ottawa January 17th 2024: Disruptive Technologies in Security 2024150 Louis-Pasteur Private, 150 Louis-Pasteur Private · Ottawa, ON**Welcome to our in Person Meetup at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 564 **Live Stream**: We will continue to Live Stream on our YouTube channel. (https://www.youtube.com/@OWASP_Ottawa). Subscribe to our YouTube channel, set a reminder and you’ll get a notification as soon as we go live! **YouTube Live Stream Link**: https: (read more)
  • Nov 15, 2023 (18:00): OWASP Ottawa November 15th 2023: DevSecOps: Containers, Vulnerabilities, & SCA 150 Louis-Pasteur Private room 464, 150 Louis-Pasteur Private room 464 · Ottawa, ON**Welcome to our in Person Meetup at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 564 **(Note Room Change again)** **Health Notice:** Based on the [Ottawa Public Health Guidelines](https://www.ottawapublichealth.ca/en/public-health-topics/masks.aspx) we strongly recommend that attendees wear a mask while not presenting. This will reduce t (read more)
  • Oct 18, 2023 (18:00): OWASP Ottawa October 18th 2023: Digital Self Defence-The AI Edition150 Louis-Pasteur Private room 464, 150 Louis-Pasteur Private room 464 · Ottawa, ON**Welcome to our in Person Meetup at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 464 **(Note Room Change)** **Health Notice:** Based on the [Ottawa Public Health Guidelines](https://www.ottawapublichealth.ca/en/public-health-topics/masks.aspx) we strongly recommend that attendees wear a mask while not presenting. This will reduce the ris (read more)
  • Sep 20, 2023 (18:00): OWASP Ottawa September 20th 2023: Vulkan Unveiled-Tools of the Trade150 Louis-Pasteur Private room 117, 150 Louis-Pasteur Private room 117 · Ottawa, ON**Welcome to our in Person Meetup at the University of Ottawa** In-Person Location:150 Louis-Pasteur Private, Ottawa,University of OttawaRoom 117 **Health Notice:** Based on the [Ottawa Public Health Guidelines](https://www.ottawapublichealth.ca/en/public-health-topics/masks.aspx) we strongly recommend that attendees wear a mask while not presenting. This will reduce the risk of transmission and p (read more)
See all past events on meetup.com

Chapter Leadership

The Chapter leaders are Sherif Koussa, Paul IonescuTanya Janca and Garth Boyd

Organization Committee: Paul Ionescu, Pierre Ernst, Nancy Gariche, Rick Mitchel, Adam Janzen, David Petrasovic, Annie Fry, Oliver, Mark Tse

Slides from the Previous Meeting:

Threat Modeling Toolkit - Jonathan Marcil - Slides