|
10 | 10 | "description": "**19:00 \u2013 19:10** \\- Welcome and Introduction by Cloud\\-Native and OWASP Aarhus\n\n**19:10 \u2013 19:55** \\- \"Securing the DevOps Pipeline: CI/CD Flaws and Supply Chain Threats\" by Mike Larsen\n\n\u201cThe software supply chain is under siege by sophisticated adversaries. High-profile breaches, such as 3CX's compromised CI/CD pipeline\u2014where the North Korean Lazarus Group injected malicious code into widely used apps\u2014the JetBrains TeamCity exploit, where Russian state-sponsored actors gained unauthorized admin control without user interaction, and Sisense's exposure of critical credentials through unsecured GitLab repositories, highlight alarming vulnerabilities in development workflows.\nWe'll explore how these threat actors exploit flaws in CI/CD processes. Drawing on CloudNative's experience, we'll provide strategies to strengthen your DevOps pipeline without sacrificing agility.\u201d\n\n**19:55 \u2013 20:10** \\- Network break with coffee\\, tea\\, water and snacks\\.\n\n**20:10 \u2013 20:55** \\- \"Bring diversity and inclusion to tech\" by Lise Lystlund\n\n\"The tech community excels at knowledge sharing and supporting one another. Without hesitation, people from across the globe dedicate time to help others solve coding problems. To me, this reflects a welcoming and collaborative community that anyone would want to be a part of. Tech is also an appealing field, offering numerous workplace benefits and opportunities for growth. Yet, despite these advantages, the industry continues to struggle with attracting women. How is it that a group representing 50% of the population remains so underrepresented in tech\u2014and, more importantly, what can we do to change this?\"\n\n**20:55 \u2013 21:00** \\- Closing Remarks by OWASP Aarhus and Cloud Native" |
11 | 11 | }, |
12 | 12 | { |
13 | | - "group": "Bangalore", |
14 | | - "repo": "www-chapter-bangalore", |
15 | | - "name": "null / Owasp Bangalore Combined Meet on 26 October 2024", |
16 | | - "date": "2024-10-26", |
17 | | - "time": "09:00+05:30", |
18 | | - "link": "https://www.meetup.com/owasp-bangalore-chapter/events/304183468", |
19 | | - "timezone": "Asia/Kolkata", |
20 | | - "description": "### Session Schedule\n\n| Name | Speaker | Start Time | End Time | Resources |\n| ---- | ------- | ---------- | -------- | --------- |\n| **Welcome Note / Registrations** | 09:30 AM | 09:40 AM | |\n| [Supply chain security and mitigation](https://null.community/event_sessions/4508-supply-chain-security-and-mitigation) | [Taksh Medhavi](https://null.community/profile/4930-taksh-medhavi) | 09:40 AM | 10:10 AM | |\n| **Introduction to beginners** | 10:10 AM | 10:25 AM | |\n| [Malware forensics](https://null.community/event_sessions/4510-malware-forensics) | [Zero2Infinite](https://null.community/profile/22265-zero2infinite) | 10:25 AM | 11:20 AM | |\n| **Networking Session + Break** | 11:20 AM | 11:45 AM | |\n| [Detection Engineering for SOC](https://null.community/event_sessions/4512-detection-engineering-for-soc) | [sunil](https://null.community/profile/41321-sunil) | 11:45 AM | 12:40 PM | |\n| [Ligolo-ng and demo](https://null.community/event_sessions/4513-ligolo-ng-and-demo) | [infosecvarun3](https://null.community/profile/55548-infosecvarun3) | 12:40 PM | 01:35 PM | |\n| **Feedback + Next Month's Planning** | 01:35 PM | 01:55 PM |" |
| 13 | + "group": "Baku", |
| 14 | + "repo": "www-chapter-baku", |
| 15 | + "name": "Application Security seminar", |
| 16 | + "date": "2024-10-27", |
| 17 | + "time": "12:00+04:00", |
| 18 | + "link": "https://www.meetup.com/owasp-baku-chapter/events/304222531", |
| 19 | + "timezone": "Asia/Baku", |
| 20 | + "description": "Join our online seminar to learn how to keep applications secure. We'll cover common security risks, safe coding tips, and tools to help protect against attacks. This seminar is great for developers, security beginners, and anyone interested in making apps safer" |
| 21 | + }, |
| 22 | + { |
| 23 | + "group": "Baku", |
| 24 | + "repo": "www-chapter-baku", |
| 25 | + "name": "Application Security seminar", |
| 26 | + "date": "2024-10-27", |
| 27 | + "time": "12:00+04:00", |
| 28 | + "link": "https://www.meetup.com/owasp-baku-chapter/events/304214272", |
| 29 | + "timezone": "Asia/Baku", |
| 30 | + "description": "Join our online seminar to learn how to keep applications secure. We'll cover common security risks, safe coding tips, and tools to help protect against attacks. This seminar is great for developers, security beginners, and anyone interested in making apps safer" |
21 | 31 | }, |
22 | 32 | { |
23 | 33 | "group": "Belgium", |
|
29 | 39 | "timezone": "Europe/Brussels", |
30 | 40 | "description": "On November 14th, we organize our next OWASP Belgium chapter meeting in Lamot (Mechelen).\n\nThis event is co-located with the [CyberSecurity event \"Strategic Research and Industry Impact\"](https://cybersecurity-bites.be/cybersecurity-strategic-research-industry-impact-2nd-edition/).\n\n**Agenda**:\n\n* 17h30-19h: networking drink\n* 19h-19h10: **OWASP update**\n* 19u10-19h50: **TBD**\n* 19h50-20h30: **TBD**\n\nMore info can be found on the Belgium OWASP chapter page at [https://owasp.org/www-chapter-belgium/#div-meetings](https://owasp.org/www-chapter-belgium/#div-meetings) .\n\nOur chapter meetings are open for everyone, and attendance is free of charge. We ask you to register on Meetup in order to provide you with last-minute updates, if needed." |
31 | 41 | }, |
| 42 | + { |
| 43 | + "group": "Bhopal", |
| 44 | + "repo": "www-chapter-bhopal", |
| 45 | + "name": "Let's Talk ML Security", |
| 46 | + "date": "2024-11-10", |
| 47 | + "time": "12:00+05:30", |
| 48 | + "link": "https://www.meetup.com/owasp-bhopal-chapter/events/304220240", |
| 49 | + "timezone": "Asia/Kolkata", |
| 50 | + "description": "Dive into the essentials of securing machine learning systems! This event explores key challenges in ML security, including model vulnerabilities, adversarial attacks, and best practices for robust protection. Perfect for developers, data scientists, and security pros, this session equips you with practical insights to safeguard ML applications against evolving threats." |
| 51 | + }, |
32 | 52 | { |
33 | 53 | "group": "Cincinnati", |
34 | 54 | "repo": "www-chapter-cincinnati", |
|
149 | 169 | "timezone": "Australia/Melbourne", |
150 | 170 | "description": "G'day all,\n\nIt was great to see new faces last month. Thank you to those that attended.\n\nIn our last meetup, attendees voted for [YOI Indonesian Fusion](https://yoirestaurant.com.au/) as our location for next month. On 30th October 2024 6PM, there we shall meet.\n\n*There's NO BOOKING. If you're the first to arrive, please grab a table for the group and post a picture of the table's location in the comments of this meetup event. We'll use it to locate each other. (If you don't see a post, you're lucky first. Please grab us a table and post a pic. )*\n\n**Please remember to update your RSVP if you can no longer attend.** Even if it's just 30 minutes prior. It'll help whomever that arrives first know how big a table to get.\n\nWe're looking forward to the discussions we had once again.\n\nSee you there.\n\nMore details on the format, and what to expect below:\n\n**The Practitioner's Roundtable**\nIt's a monthly meetup, for AppSec/ProdSec practitioners to participate discussing AppSec/ProdSec topics and share knowledge. There's no speakers, or sponsors; just a facilitator, with the expectation that you'll join the conversations. Broadly, the idea is that you're swinging by after work, for a regular catch-up with our peers over dinner (with F&B at your own cost) with a known format.\n\\-\\-\\-\n**So, what's happening?**\nThe format:\n\n1. At 6pm all attendees arrive, and order (and pay for) their own meals - we'll do the rest while waiting for the meals to arrive and as we eat.\n2. All attendees write down on a card 1-2 AppSec/ProdSec related topics they'd like to discuss.\n3. We'll all each cast 3 votes on the cards we'd like to discuss.\n4. We'll sort the cards, and discuss the topics with the top 3-4 highest votes. Starting with the topic with the highest votes.\n5. After 5(?) minutes, we all decide if we'd like to continue or move on to the next topic.\n6. If we continue, after 15(?) minutes, we all move on to the next topic of discussion.\n7. At 7pm, we wrap up and officially end. Before everyone leaves, we vote on the next restaurant that we'll meet at.\n\nThis is[ inspired by Lean Coffee](https://agilecoffee.com/leancoffee/), and intended for participants to be collaborators in the conversation focused on AppSec & ProdSec topics. You are expected to participate in the AppSec/ProdSec conversations constructively if you attend. This isn't the right place for BizDev focused conversations.\n\nFor the location selection, here are the considerations we work with:\n\n1. It must be within 1 \"city block\" of the Melbourne Free Tram Zone.\n2. The typical price for a whole meal (without alcohol) should be under $50 per person.\n3. It must allow individual orders - you'd be ordering and paying for your own meal.\n4. It will need to have seating space for the group to say, just walk-in to the restaurant ( this may change if it grows beyond 10 regular attendees ).\n5. It must be quiet enough for us to have meaningful conversations.\n6. It must not be a restaurant we've been to in the past 6 months. (Just to keep things fresh )\n\nAlso, although we use the word \u201crestaurant\u201d this is used broadly to mean food establishment - if we\u2019re all keen on hitting up a decent kebab place, that works. As a courtesy to the venue, there's an expectation that you'd order something there." |
151 | 171 | }, |
152 | | - { |
153 | | - "group": "Mumbai", |
154 | | - "repo": "www-chapter-mumbai", |
155 | | - "name": "OWASP Mumbai | October Meet, 2024 | Virtual", |
156 | | - "date": "2024-10-26", |
157 | | - "time": "11:30+05:30", |
158 | | - "link": "https://www.meetup.com/owasp-mumbai-chapter/events/304147147", |
159 | | - "timezone": "Asia/Kolkata", |
160 | | - "description": "Introduction to Malware Analysis\nWindows architecture and internals, along with an introduction to basic assembly and PE (Portable Executable) format, including how payloads are placed in various sections.\nPayload encryption/obfuscation techniques , with binaries from previous ctfs.\nTake home CTFs.\n\nSpeakers\nRachit Arora\nAakash Raman\nDhanush Nair\nAryan Kulshrestha\n\nDuration 1 hour - 1 hour 15 minutes" |
161 | | - }, |
162 | 172 | { |
163 | 173 | "group": "Nashville", |
164 | 174 | "repo": "www-chapter-nashville", |
|
0 commit comments