From 84ed3215b96acbe98167dac37c1393b4fee5337e Mon Sep 17 00:00:00 2001 From: OWASP Foundation Date: Sat, 26 Oct 2024 00:04:45 -0400 Subject: [PATCH] remote update file --- _data/community_events.json | 20 -------------------- 1 file changed, 20 deletions(-) diff --git a/_data/community_events.json b/_data/community_events.json index 6306e3de83..d98d73ea4f 100644 --- a/_data/community_events.json +++ b/_data/community_events.json @@ -9,16 +9,6 @@ "timezone": "Europe/Copenhagen", "description": "**19:00 \u2013 19:10** \\- Welcome and Introduction by Cloud\\-Native and OWASP Aarhus\n\n**19:10 \u2013 19:55** \\- \"Securing the DevOps Pipeline: CI/CD Flaws and Supply Chain Threats\" by Mike Larsen\n\n\u201cThe software supply chain is under siege by sophisticated adversaries. High-profile breaches, such as 3CX's compromised CI/CD pipeline\u2014where the North Korean Lazarus Group injected malicious code into widely used apps\u2014the JetBrains TeamCity exploit, where Russian state-sponsored actors gained unauthorized admin control without user interaction, and Sisense's exposure of critical credentials through unsecured GitLab repositories, highlight alarming vulnerabilities in development workflows.\nWe'll explore how these threat actors exploit flaws in CI/CD processes. Drawing on CloudNative's experience, we'll provide strategies to strengthen your DevOps pipeline without sacrificing agility.\u201d\n\n**19:55 \u2013 20:10** \\- Network break with coffee\\, tea\\, water and snacks\\.\n\n**20:10 \u2013 20:55** \\- \"Bring diversity and inclusion to tech\" by Lise Lystlund\n\n\"The tech community excels at knowledge sharing and supporting one another. Without hesitation, people from across the globe dedicate time to help others solve coding problems. To me, this reflects a welcoming and collaborative community that anyone would want to be a part of. Tech is also an appealing field, offering numerous workplace benefits and opportunities for growth. Yet, despite these advantages, the industry continues to struggle with attracting women. How is it that a group representing 50% of the population remains so underrepresented in tech\u2014and, more importantly, what can we do to change this?\"\n\n**20:55 \u2013 21:00** \\- Closing Remarks by OWASP Aarhus and Cloud Native" }, - { - "group": "Algiers", - "repo": "www-chapter-algiers", - "name": "I[OT] Security", - "date": "2024-10-25", - "time": "19:00+01:00", - "link": "https://www.meetup.com/owasp-algiers-chapter/events/304181273", - "timezone": "Africa/Algiers", - "description": "October? Cybersecurity Awareness Month!\n\nOWASP Tunisia Chapter and OWASP Algiers Chapter are thrilled to invite you to an upcoming webinar on Drone Security and Operational Technology (OT) Security, featuring two expert speakers:\n\nMehdi Nacer KERKAR: IT/OT Cybersecurity Consultant and Board Advisor at OWASP Algiers Chapter.\n\nHelmi RAIS: Group CyberSecurity Practice Leader at Expleo Group and President of ISC2 Paris Chapter.\n\nIn this session, you'll gain insights into:\nKey challenges in securing OT environments\nThe convergence of IT and OT and its impact on security\nAttack simulation on industrial control systems (ICS)\nBest practices for safeguarding critical infrastructure\n\n25 October 2024 at 7 PM (UTC+1)\nJoin us live on the OWASP Tunisia YouTube channel: [https://www.youtube.com/watch?v=30gvG5EByHw](https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D30gvG5EByHw%26fbclid%3DIwZXh0bgNhZW0CMTAAAR2VwcVGifMkpwMr-9wVcXpZYgsazLatkyeN3UFZKtm8kfo4d-0iY_ZknqA_aem_1OPCY6j0tBy0dFG5ZOUhUA&h=AT1RPknPhp0cXC8opUepMzo1DeOqX5Qx2YuZOqRpvBwn6umxDHESRSoMJwvN6F_hq6Sjgz8tQ2gm6T9d32sK44DXnI0mMJsPsexQH9qFtA9ueHUhFgqX1eOKZ5pe&__tn__=-UK-R&c[0]=AT3j0Vwr6nnhR6eqB_n0w_mytSrsxMOHBfoxGbBqgLPCcg4DMMkilANAmV_QeK0m-UdRDl0HQBEJUECEKfIshRjI6CxPjRGF4KSJmFjQ0CB6wSWot4xCpW8MUo290cY34vIxfsuI42QlAq_m0UcQXxdwR_xe3dIADvRFZrGqdSM-0kN__iILv5ORpLCu0Mz1CVpIlKC7Y5uMek7nwGi0mkTzusEDtvSR)\n\nDon't miss this chance to engage with our expert speakers and explore the fascinating field of cybersecurity!\n\n[#OTSecurity](https://web.facebook.com/hashtag/otsecurity?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#DroneSecurity](https://web.facebook.com/hashtag/dronesecurity?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#CyberSecurity](https://web.facebook.com/hashtag/cybersecurity?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#CriticalInfrastructure](https://web.facebook.com/hashtag/criticalinfrastructure?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#CyberThreats](https://web.facebook.com/hashtag/cyberthreats?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#IndustrialSecurity](https://web.facebook.com/hashtag/industrialsecurity?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#InfoSec](https://web.facebook.com/hashtag/infosec?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#OWASP](https://web.facebook.com/hashtag/owasp?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#OWASPTunisia](https://web.facebook.com/hashtag/owasptunisia?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R) [#OWASPAlgiers](https://web.facebook.com/hashtag/owaspalgiers?__eep__=6&__cft__[0]=AZWbpsEyHenqjzCyBOkp_RObehcDYgsjjYMs6rl722ZdHTJdo8vfIZp2qPzQ4j0jv1FNYL63WN51_M_FuY25LVcr0EmcTmHAkSuzXRQzDofBoIgv83ox6oG9Yg1GewV1duS34jnRZxAIi5h-3MmoVmL0oP0myuGLopib8AUyBtH78J-x7MUGvK2rJVo7Ojl7J6bzyckU9wgv1DP1TbNu7V0X&__tn__=*NK-R)" - }, { "group": "Bangalore", "repo": "www-chapter-bangalore", @@ -189,16 +179,6 @@ "timezone": "Pacific/Auckland", "description": "We're picking up our regular Meetup schedule in 2024, starting in March.\n\nOur approximate agenda for the evening:\n\n* 6:00 p.m. - Gather and networking\n* 6:30 p.m. - Introductions, Top 10 Topic\n* 7:15 p.m. - Pizza and more networking\n* 7:45 p.m. - Technical Topic\n\nWe restarted our introductory coverage of the OWASP Top 10 (2021 edition) with A01:2021 in March, covering a new item each meeting.\n\nOur Top 10 topic for November will be **A05:2021 - Security Misconfiguration**.\n\n**Technical Topic Speaker:** Jagan Boda (Jay)\n**Talk Title:** How scary is a Post-Quantum Computing Crypto World?\n\nIn my presentation, I will explore the transformative potential and security challenges of quantum computing. I will try to explain key quantum concepts like superposition and entanglement, contrasting them with classical computing principles.\n\nI will address security concerns by discussing the vulnerability of current cryptographic algorithms and infrastructure to quantum attacks. A brief history of cryptography and solutions to the challenges from quantum computing. Then we will outline ongoing efforts to develop quantum-resistant cryptography and the standardization processes from organizations such as NIST.\n\nOpportunities for adoption of post-quantum computing safe algorithms exist today and can be planned for and budgeted. Education and awareness will be crucial, ensuring stakeholders understand the implications of quantum computing on cybersecurity.\n\nBy the end of the presentation, attendees will gain a foundational understanding of quantum computing's impact on security and practical steps to protect sensitive data in a quantum-enabled future.\n\nWe're always looking for presenters and topics for future meetings - contact John (john.dileo@owasp.org) if you have an idea for a topic, or a presentation you'd like to make. That way, it won't always be John talking about what he's been working on recently.\n\nThe Auckland-area OWASP Meetup usually takes place on the third Tuesdays of March, May, July, September, and November. There is no Meetup in January, as our members enjoy their holidays." }, - { - "group": "Noida", - "repo": "www-chapter-noida", - "name": "OWASP Noida October Meetup", - "date": "2024-10-26", - "time": "10:00+05:30", - "link": "https://www.meetup.com/owasp-noida-chapter/events/304022117", - "timezone": "Asia/Kolkata", - "description": "Join us for the **OWASP Noida October Meetup**, a community-driven gathering focused on the latest trends in cybersecurity and application security. This event is an excellent opportunity for security enthusiasts, developers, and professionals to come together and share knowledge, best practices, and insights on web and mobile application security.\n**What to Expect:**\n\n* **Expert Talks:** Hear from seasoned security professionals who will share their experiences and discuss the latest techniques in cybersecurity.\n* **Networking:** Meet like-minded individuals from the security community to exchange ideas and expand your professional network.\n* **Q&A Sessions:** Engage with the speakers in interactive Q&A sessions to deepen your understanding of the topics covered.\n\nWhether you are a beginner eager to learn about cybersecurity or an experienced professional looking to stay updated on the latest developments, this meetup is for you.\n**Event Details:**\n\n* **Date:** Saturday, October 26, 2024\n* **Time:** 10 AM to 3 PM\n* **Location:** TBA\n* **Registration:** This event is free, but registration is required.\n* Also Register on: https://lu.ma/zjgb9wwg\n\nDon\u2019t miss out on this opportunity to enhance your cybersecurity knowledge and skills! Register now and be a part of the OWASP community." - }, { "group": "Orange County", "repo": "www-chapter-orange-county",