Mobile Security
Meet other local people interested in Mobile Security: share experiences, inspire and encourage each other! Join a Mobile Security group.
0
members
0
groups
Frequently Asked Questions
Yes! Check out mobile security events happening today here. These are in-person gatherings where you can meet fellow enthusiasts and participate in activities right now.
Discover all the mobile security events taking place this week here. Plan ahead and join exciting meetups throughout the week.
Absolutely! Find mobile security events near your location here. Connect with your local community and discover events within your area.
Mobile Security Events Near You
Connect with your local Mobile Security community
AI Development Risk Case Studies and how Agentic AI is the future of Appsec
OWASP is ending use of Meetup, so I built an eventbrite for the event.
https://www.eventbrite.com/e/ai-development-risk-case-studies-and-how-agentic-ai-is-the-future-of-appsec-tickets-1981450622150?aff=oddtdtcreator
AI is transforming how software is designed, developed, and deployed, dramatically accelerating velocity while introducing new categories of risk. As organizations adopt AI-assisted coding, autonomous agents, and increasingly complex model interactions, traditional application security approaches struggle to keep pace. This talk examines emerging AI-driven risks through real case studies from the field, highlighting issues such as insecure code generation, data-leakage pathways, model manipulation, and evolving supply-chain threats. We will explore how engineering teams must adapt their people, processes, and governance models to secure AI-augmented development workflows effectively. The session will then introduce agentic AI as the next evolution in application security—autonomous systems capable of continuous analysis, multi-step reasoning, and real-time remediation. Attendees will learn how combining agentic AI with modern practices can reduce developer friction, improve coverage, and create a future-ready application security strategy designed for the demands of AI-native software development
Azure CBUS February: Build Your Own MCP Server
### Tools in your AI's Toolbox : An introduction to MCP Servers
The generative AI revolution has unlocked unprecedented capabilities, but the next frontier is agency: empowering models to interact with, query, and act upon the world. The current challenge is the “N x M integration problem,” where every AI model requires a custom, brittle integration for each external tool or data source. This approach simply doesn’t scale. How can we give an AI access to our sales leads, code repositories, or IoT devices in a standardized, secure, and reusable way?
This session introduces Anthropic’s Model Context Protocol (MCP), the open-source framework designed to solve this challenge and become the universal connector—the USB-C port—for AI. MCP standardizes how AI models discover and use external tools, moving beyond simple function-calling to a robust, client-server architecture. We will dive into how this open protocol is creating a new ecosystem for building powerful, context-aware AI agents.
Join this session for a developer-focused introduction where you will learn how to:
Understand the core concepts of the open-source Model Context Protocol and its architecture.
Utilize pre-built, open-source MCP servers to instantly connect AI to tools like Git, Slack, and databases.
Build a custom MCP server to securely expose your own proprietary data and APIs as tools for any compliant AI.
Move beyond bespoke integrations and contribute to a standardized, collaborative, and open ecosystem.
Stop building one-off connectors and start building intelligent agents. This session will give you the practical knowledge to leverage MCP and create the next generation of AI that doesn’t just talk, but does.
Want to be a speaker? submit your talk to our Call for Presenters!!!
[https://sessionize.com/azure-cbus-2026/](https://sessionize.com/azure-cbus-2026/)
IMPORTANT NOTE ABOUT UPCOMING TRANSITION | February 2026 Chapter Event
**Important note about the retirement of the OWASP Meetup platform**
Fellow OWASP Toronto members,
We are making an important announcement regarding an upcoming transition. The OWASP Foundation has announced that they will be retiring their Meetup Pro subscription effective January 31, 2026:
https://owasp.org/blog/2026/01/13/retiring-meetup.html
This means that our OWASP Toronto Meetup group may be removed in the coming days. We understand this may be short notice, so we want to make this announcement before we lose access.
You are an important part of our chapter community. Many attendees I have spoken to have discovered OWASP Toronto via Meetup. To continue engaging with the community while using a platform that enables discoverability, we will moving to the [Evenbrite](https://owasp-toronto-chapter.eventbrite.com/) for publishing our events. You can continue to follow us via our [Google Group mailing list](https://groups.google.com/a/owasp.org/g/toronto-chapter), our [Chapter page](https://owasp.org/www-chapter-toronto/), our [LinkedIn group](https://www.linkedin.com/showcase/owasp-toronto-chapter/), our [YouTube channel](https://www.youtube.com/channel/UCqmBl-u_4cOEiH3OXWE3sPg), our Slack channel ([#owasp-toronto-chapter](https://owasp.slack.com/archives/C075DRCB1PZ), does not require an OWASP membership), as well as on our new [Discord channel](https://discord.gg/eg3upJ6N).
Please see below for details of our February 12 event. Visit our [Eventbrite](https://www.eventbrite.ca/e/owasp-toronto-february-2026-tickets-1982057078076) page for more information!
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
**Dual Talk Event: Raising Cyber Awareness Through Electronic Word of Mouth \| When AI Becomes Application Logic: Securing Shadow AI**
Presentation #1: Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment
Awareness of the many cybersecurity threats, vulnerabilities, and solutions to mitigate these threats/vulnerabilities is instrumental in improving basic cybersecurity behaviours. A healthy body of knowledge has been devoted to exploring how to better increase awareness, in any given topic, among members of the general public which have explored the role of word of mouth (WOM) and electronic word of mouth (eWOM) in spreading awareness. In recent years, the rise of social media platforms as an alternative communication channel has created efforts to promote cybersecurity awareness online regarding the numerous cybersecurity threats. However, little research attention has been devoted to exploring eWOM communication on social media surrounding cybersecurity awareness. Moreover, no research to date has considered the impact of the COVID-19 pandemic on these eWOM discussions related to cybersecurity awareness. To address these literature gaps, this research collected 227, 270 relevant tweets surrounding cybersecurity awareness from 2018 to 2022 conducting an exploratory analysis of the corpus using social network analyses, topic modelling and semantic similarity analysis. The results found topics rose in prominence and then dissipated as newer topics emerged while information was found to spread incredibly far despite a high degree of community forming, suggesting the online discourse is very open and evolving over time. These findings illustrate the potential of social media as an effective tool for raising cybersecurity awareness. The impact of COVID-19 observed an increase in the reach of information in addition to new specific topics emerging in the discourse, but the effects appear to be temporary.
Speaker: Dane Vanderkooi
Dane Vanderkooi is a fifth-year Doctoral Candidate in management science at TorontoMet University who specializes in researching cybersecurity and digital privacy behaviours. He completed his bachelor's of commerce at Uottawa and holds a master's in management science degree from Ryerson University. Dane has published his research in academic journals, conferences and industry reports. Dane has also presented his research at various conferences including HC2P, SERENE-RISC, HCII, CyberToronto, ASAC and SocialMedia+Society, AMCIS, and ICIS. Dane is certified in cybersecurity (CC) from ISC2 and has practical experience working in the field of cybersecurity with private industry, non-for-profits, and the public sector including the Canadian Armed Forces, Public Health and Safety Canada, Justice Canada, Innovation Science and Economic Development (ISED), Bell, BMO, Desjardins, Ritchie Bros and Achev.
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
Presentation #2: When AI Becomes Application Logic: Securing Shadow AI
AI is entering production faster than security teams can see it. From “simple” chatbot integrations to LLMs wired directly into business logic — and agents running entire application flows — organizations are accumulating Shadow AI: untracked, ungoverned, and often dangerously over-privileged.
This talk shows how AI quietly changes application behavior at runtime: expanding trust boundaries, introducing non-deterministic authorization paths, and creating blast radiuses that static inventories and policy checklists cannot capture.
Using real-world architectural patterns and runtime signals, we’ll demonstrate how security teams can identify where AI is actually used, what it can access, and how attackers abuse AI-driven logic to exploit new classes of vulnerabilities.
Attendees will leave with a practical framework for securing AI-powered applications — grounded in runtime behavior and evidence, not assumptions.
Speaker: Daniel Shechter
Daniel Shechter is the CEO and Co-Founder of Miggo, an Application Detection and Response platform. Shechter has an impressive background in both threat intelligence and within the security industry. Before founding Miggo he was leading cyber security teams in Israel's elite cyber intelligence division, Unit 8200. He later joined McKinsey, a strategy and management consulting company, where he provided guidance on acquisition, developing new business strategies and more. Shechter is an industry expert in security, incident detection and response, threat intelligence, and attack observability.
Data & Analytics Wednesday - Compensation Data
**People Analytics 101: Making Sense of Compensation Data**
Compensation data is one of the most widely used and widely misunderstood forms of people analytics.
The session will cover where compensation data comes from, including market pricing data, internal payroll data, and benchmarking sources, and how companies think about structuring and analyzing that information. We will explore how compensation data is leveraged to set salary ranges, manage internal equity, support hiring and retention, and align pay with business strategy. A portion of the session will address common data challenges and limitations, such as market noise, inconsistent job matching, and incomplete datasets, while keeping the primary focus on practical use rather than technical depth.
The session will also look ahead at where the space is going, including the growing impact of pay transparency laws, expanding pay equity requirements, and emerging regulations in the US and Europe that require organizations to report on gender and pay gaps. The goal is to give attendees a clear mental model for how compensation analytics works today and why getting it right is becoming increasingly critical.
(note: we are back at Rev1 this month!)
**About Our Speaker**
[Alex Moore](https://www.linkedin.com/in/alexscottmoore/) is the founder of [Moore Cooperative](https://moorecooperative.com/), where he advises organizations on compensation strategy, pay equity, and people analytics. His work focuses on helping organizations like the Ohio Supreme Court design, analyze, and communicate compensation systems that are data-informed, defensible, and aligned with organizational goals. Alex lives in Granville, Ohio and has three little kiddos.
More info at [cbusdaw.com](https://cbusdaw.com)
Curling Beginners Clinic
**TRY AN OLYMPIC SPORT IN A FUN, BEGINNER-FOCUSED CLINIC!**
Enjoy 15 minutes of off-ice basics, 50 minutes learning to sweep and deliver stones, then play a couple of ends with your group.
Afterward, join us in the warm room for broomstacking (socializing) with your teammates and opponents.
Limited spots available.
**What to wear:**
Clean rubber soled tennis shoes (required), loose/stretchy clothing (no jeans), and warm layers - ice ranges 32-40 degrees F.
***\*\*\*\*\*Ski Club Membership required for this event!\*\*\*\*\****
[Home - Columbus Ski Club](https://www.columbusskiclub.org/)
Once membership is established - follow below link to sign up for Curling:
[Curling Clinic - Begin to Curl - Calendar - Columbus Ski Club](https://www.columbusskiclub.org/content.aspx?page_id=4091&club_id=686961&item_id=2793520)
Psychic Development Series II - Pueo Group
Private Group. Closed to the Public
Knowing ourselves and understanding our abilities is the first step toward wielding our gifts with control and accuracy.
In subsequent classes we will verify and hone our talents with activities and discussion. These are hands-on workshops and participation is expected.
The goal of our series will be to develop expertise in areas of particular interest such as mediumship, channeling, divination, healing and, etc.. Our ultimate directions will be determined by class members as we evolve.
I look forward to sharing and discovering with you. - Cynthia
Gold Star Business Networking
Bring your business cards and network in person with other business professionals! Gold Star Referral Clubs is one of the most established professional networking organizations in the country, with multiple groups in central Ohio. Join us!






