Skip to content

OWASP

Meet other local people interested in OWASP: share experiences, inspire and encourage each other! Join a OWASP group.
pin icon
1,109
members
people1 icon
1
groups

Frequently Asked Questions

Yes! Check out owasp events happening today here. These are in-person gatherings where you can meet fellow enthusiasts and participate in activities right now.

Discover all the owasp events taking place this week here. Plan ahead and join exciting meetups throughout the week.

Absolutely! Find owasp events near your location here. Connect with your local community and discover events within your area.

OWASP Events Near You

Connect with your local OWASP community

CBusData - Practical AI for Power BI Developers
CBusData - Practical AI for Power BI Developers
Practical AI for Power BI Developers A year ago, “agentic AI” was mostly hype for Power BI teams. Today, it deserves your undivided attention. For Power BI pros, there is now a real opportunity to reduce repetitive development work, accelerate delivery, and help developers do more, but only when strong DataOps practices are in place to make AI workflows effective. This session is a no-nonsense introduction to effective AI patterns for Power BI and Fabric development. Along the way, we will make sense of the growing pile of terminology, including skills, plugins, hooks, and MCP. You will see examples of how modern AI tooling can help with development tasks across Power BI and Fabric, along with the prerequisites, guardrails, and DataOps principles needed to use it responsibly. Whether you're burned out on AI hype or already using Copilot CLI daily, this session will show you the foundations that are finally making AI-assisted development genuinely useful.
OWASP Toronto May 2026: CMD+CTRL Cyber Range
OWASP Toronto May 2026: CMD+CTRL Cyber Range
Join us on Wednesday, May 13, 2026, from 6-8 PM EDT, for a unique and challenging event featuring the CMD+CTRL Cyber Range. OWASP Toronto is happy to host a Cyber Range event with CMD+CTRL! CMD+CTRL Cyber Ranges are intentionally vulnerable applications and websites that tempt players to steal money, view their boss’s salary, acquire expensive items for free, and conduct other nefarious acts. **Bring your laptop to participate in-person, or join virtually!** * In-person: In person: Security Compass, 325 Front Street West, Unit 103, Toronto, ON * Online: See registration below **You MUST register on the following site to participate:** https://web.cmdnctrlsecurity.com/owasp-toronto-register
Columbus PHP: Monthly Meetup
Columbus PHP: Monthly Meetup
Our monthly PHP meetup. A virtual shindig courtesy of Zoom. Check back here for the details around 6:15 pm
Columbus Arduino Raspberry Pi Enthusiasts (CARPE) (Check Location)
Columbus Arduino Raspberry Pi Enthusiasts (CARPE) (Check Location)
Bring your Raspberry Pi, Arduino, microcontroller, or any other electronic project and join fellow electronics makers for a night of creativity and collaboration! This session is open forum to share your current projects—whether complete or in progress, it’s all interesting! Whether you’re deep into embedded systems, exploring new ideas, or just getting started, you’ll find a welcoming space to collaborate, share, and get inspired. **New to electronics or curious about tinkering?** You’re absolutely welcome. If you’re a beginner and want to experiment, I’ll have a couple of starter kits available so you can try things out—whether that’s blinking your first LED, putting something on a display, or experimenting with simple sensors. No pressure and no experience required—just an interest in learning and building. While we continue to pursue a more permanent venue for this Meetup, we’ll be using public library facilities based on availability. This session will be at the Worthington Park Library in the Olentangy Meeting Room.
Columbus Code & Coffee 86 @ Improving
Columbus Code & Coffee 86 @ Improving
Columbus Code & Coffee is an inclusive, informal co-working session. People of all skill levels attend, and we love it that way. Many people (optionally) bring projects to work on, and many other people (optionally) socialize the entire time. It's entirely up to you! **What to Expect at the Intro Circle** \~\~\~\~\~\~\~\~\~\~\~\~\~ Near the beginning of the event (1:30 pm), we do a standup: * Organizer announcements, updates, and logistics Round 1 - (7 secs max): * Your name * What you're working on * What you can help others with Round 2: * Community events you wanna plug. If none, that's cool too. Round 3: * Job opportunities you're hiring for OR announce that you are looking for one. If none, that's cool. After the introduction circle, everything is self-organized! Feel free to work alone, pair up, attend one of our workshops/presentations, or mingle!
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
What does a trojan look like when it has over 900k+ combined installs and a Forbes write-up? Exactly like a legitimate Chrome extension. This session presents a technical dissection of two Chrome extensions, each with over one million active installations — that functioned as trojans in production environments, evading detection while operating through entirely legitimate browser APIs. These were not obscure tools. They were widely trusted, actively recommended, and covered by mainstream press before their malicious behavior was fully understood. We will walk through the actual source code of both extensions, showing precisely how the malicious functionality was constructed, concealed, and executed at scale. This analysis anchors a broader examination of how modern compromises actually succeed. Drawing on aggregated real-world incident data, we identify the technique categories currently delivering the highest adversary return, and why they keep working. Spoiler: it's rarely a zero-day. It's trust. The Chrome extension deep-dive will cover: * Line-by-line source analysis of how malicious functionality was embedded within working, useful software * Which browser permission scopes were abused, and why a million users — and their IT teams — didn't see it coming * The behavioral and structural indicators that distinguish a trojan extension from a legitimate one, and how to operationalize detection around them This session closes with a practical defensive prioritization framework built around observed attacker behavior: which mitigations are measurably reducing risk in production environments, which are consuming budget without impact, and a scoring methodology your team and leadership can apply immediately. **Source material:** Primary analysis of extension source code, corroborated by reporting from Forbes and other established outlets. **What this is not:** A vendor pitch, a speculative threat narrative, or a surface-level breach retrospective. **Who should attend:** Security architects, AppSec and cloud security practitioners, blue team leads, threat hunters, browser security practitioners, and security leaders responsible for prioritizing risk and investment decisions.
Cocoaheads
Cocoaheads
Come out to Improving for our monthly iOS and Mac meetings. This Month's Presentation: Nothing yet. (You should volunteer). What is Cocoaheads (http://cocoaheads.org/)? CocoaHeads is a group devoted to discussion of Apple Computer's Cocoa Framework for programming on MacOS X and iOS (including the iPhone, iPad and Apple Watch). During monthly meetings, members present on their projects and offer tutorials on various programming topics. What is BuckeyeCocoa (http://buckeyecocoa.org/)? BuckeyeCocoa is a group of Objective-C/Swift developers/enthusiasts. We host monthly Cocoaheads and near-weekly NSCoder meetings in Columbus, Ohio. The meetings are free to attend. Presentations! Presenters welcome! We are always in need of people willing to present material. Any Swift and/or Objective-C related topic is welcome. Times can be 5 minutes (i.e. lightning talks) to a maximum of 2 hours. Interested? Contact info is on the BuckeyeCocoa website. To volunteer for a presentation contact us at @BuckeyeCocoa on Twitter. Follow us on Twitter! @BuckeyeCocoa (https://twitter.com/#!/Buckeyecocoa/) For more information: http://buckeyecocoa.org/