Physical Security
Meet other local people interested in Physical Security: share experiences, inspire and encourage each other! Join a Physical Security group.
1,447
members
1
groups
Frequently Asked Questions
Yes! Check out physical security events happening today here. These are in-person gatherings where you can meet fellow enthusiasts and participate in activities right now.
Discover all the physical security events taking place this week here. Plan ahead and join exciting meetups throughout the week.
Absolutely! Find physical security events near your location here. Connect with your local community and discover events within your area.
Physical Security Events Near You
Connect with your local Physical Security community
AI Development Risk Case Studies and how Agentic AI is the future of Appsec
OWASP is ending use of Meetup, so I built an eventbrite for the event.
https://www.eventbrite.com/e/ai-development-risk-case-studies-and-how-agentic-ai-is-the-future-of-appsec-tickets-1981450622150?aff=oddtdtcreator
AI is transforming how software is designed, developed, and deployed, dramatically accelerating velocity while introducing new categories of risk. As organizations adopt AI-assisted coding, autonomous agents, and increasingly complex model interactions, traditional application security approaches struggle to keep pace. This talk examines emerging AI-driven risks through real case studies from the field, highlighting issues such as insecure code generation, data-leakage pathways, model manipulation, and evolving supply-chain threats. We will explore how engineering teams must adapt their people, processes, and governance models to secure AI-augmented development workflows effectively. The session will then introduce agentic AI as the next evolution in application security—autonomous systems capable of continuous analysis, multi-step reasoning, and real-time remediation. Attendees will learn how combining agentic AI with modern practices can reduce developer friction, improve coverage, and create a future-ready application security strategy designed for the demands of AI-native software development
CBusData - Ok I Want to Get Data into Fabric - Now What?
I love my job and one of the main things I do is help customers get going with any of the data technologies at Microsoft. Right now there are a lot of my customers asking about Microsoft Fabric. It's hard to weave across all the shiny new options across the Fabric landscape, let alone figure out where it fits into your organization. In this session we'll focus on answering one question - how can I get data into Fabric? We'll talk through the "it depends" options and see some of the options in live demos.
IMPORTANT NOTE ABOUT UPCOMING TRANSITION | February 2026 Chapter Event
**Important note about the retirement of the OWASP Meetup platform**
Fellow OWASP Toronto members,
We are making an important announcement regarding an upcoming transition. The OWASP Foundation has announced that they will be retiring their Meetup Pro subscription effective January 31, 2026:
https://owasp.org/blog/2026/01/13/retiring-meetup.html
This means that our OWASP Toronto Meetup group may be removed in the coming days. We understand this may be short notice, so we want to make this announcement before we lose access.
You are an important part of our chapter community. Many attendees I have spoken to have discovered OWASP Toronto via Meetup. To continue engaging with the community while using a platform that enables discoverability, we will moving to the [Evenbrite](https://owasp-toronto-chapter.eventbrite.com/) for publishing our events. You can continue to follow us via our [Google Group mailing list](https://groups.google.com/a/owasp.org/g/toronto-chapter), our [Chapter page](https://owasp.org/www-chapter-toronto/), our [LinkedIn group](https://www.linkedin.com/showcase/owasp-toronto-chapter/), our [YouTube channel](https://www.youtube.com/channel/UCqmBl-u_4cOEiH3OXWE3sPg), our Slack channel ([#owasp-toronto-chapter](https://owasp.slack.com/archives/C075DRCB1PZ), does not require an OWASP membership), as well as on our new [Discord channel](https://discord.gg/eg3upJ6N).
Please see below for details of our February 12 event. Visit our [Eventbrite](https://www.eventbrite.ca/e/owasp-toronto-february-2026-tickets-1982057078076) page for more information!
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
**Dual Talk Event: Raising Cyber Awareness Through Electronic Word of Mouth \| When AI Becomes Application Logic: Securing Shadow AI**
Presentation #1: Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment
Awareness of the many cybersecurity threats, vulnerabilities, and solutions to mitigate these threats/vulnerabilities is instrumental in improving basic cybersecurity behaviours. A healthy body of knowledge has been devoted to exploring how to better increase awareness, in any given topic, among members of the general public which have explored the role of word of mouth (WOM) and electronic word of mouth (eWOM) in spreading awareness. In recent years, the rise of social media platforms as an alternative communication channel has created efforts to promote cybersecurity awareness online regarding the numerous cybersecurity threats. However, little research attention has been devoted to exploring eWOM communication on social media surrounding cybersecurity awareness. Moreover, no research to date has considered the impact of the COVID-19 pandemic on these eWOM discussions related to cybersecurity awareness. To address these literature gaps, this research collected 227, 270 relevant tweets surrounding cybersecurity awareness from 2018 to 2022 conducting an exploratory analysis of the corpus using social network analyses, topic modelling and semantic similarity analysis. The results found topics rose in prominence and then dissipated as newer topics emerged while information was found to spread incredibly far despite a high degree of community forming, suggesting the online discourse is very open and evolving over time. These findings illustrate the potential of social media as an effective tool for raising cybersecurity awareness. The impact of COVID-19 observed an increase in the reach of information in addition to new specific topics emerging in the discourse, but the effects appear to be temporary.
Speaker: Dane Vanderkooi
Dane Vanderkooi is a fifth-year Doctoral Candidate in management science at TorontoMet University who specializes in researching cybersecurity and digital privacy behaviours. He completed his bachelor's of commerce at Uottawa and holds a master's in management science degree from Ryerson University. Dane has published his research in academic journals, conferences and industry reports. Dane has also presented his research at various conferences including HC2P, SERENE-RISC, HCII, CyberToronto, ASAC and SocialMedia+Society, AMCIS, and ICIS. Dane is certified in cybersecurity (CC) from ISC2 and has practical experience working in the field of cybersecurity with private industry, non-for-profits, and the public sector including the Canadian Armed Forces, Public Health and Safety Canada, Justice Canada, Innovation Science and Economic Development (ISED), Bell, BMO, Desjardins, Ritchie Bros and Achev.
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
Presentation #2: When AI Becomes Application Logic: Securing Shadow AI
AI is entering production faster than security teams can see it. From “simple” chatbot integrations to LLMs wired directly into business logic — and agents running entire application flows — organizations are accumulating Shadow AI: untracked, ungoverned, and often dangerously over-privileged.
This talk shows how AI quietly changes application behavior at runtime: expanding trust boundaries, introducing non-deterministic authorization paths, and creating blast radiuses that static inventories and policy checklists cannot capture.
Using real-world architectural patterns and runtime signals, we’ll demonstrate how security teams can identify where AI is actually used, what it can access, and how attackers abuse AI-driven logic to exploit new classes of vulnerabilities.
Attendees will leave with a practical framework for securing AI-powered applications — grounded in runtime behavior and evidence, not assumptions.
Speaker: Daniel Shechter
Daniel Shechter is the CEO and Co-Founder of Miggo, an Application Detection and Response platform. Shechter has an impressive background in both threat intelligence and within the security industry. Before founding Miggo he was leading cyber security teams in Israel's elite cyber intelligence division, Unit 8200. He later joined McKinsey, a strategy and management consulting company, where he provided guidance on acquisition, developing new business strategies and more. Shechter is an industry expert in security, incident detection and response, threat intelligence, and attack observability.
Columbus HUG February
Want to be a speaker? submit your talk to our Call for Presenters!!!
https://sessionize.com/cbus-hug-2026/
Psychic Fair
We will have our certified mediums available and you can receive 3 10-minute readings for $20.
To keep you safe, we will be following all CDC and Health Dept. guidelines at our psychic fair today. Sitters and readers required to wear a mask. We will maintain a minimum of 6 foot physical distance during readings. Please, if you can, bring your own portable chair to use during your readings.
Please note that we are at our wonderful new home at Unity of Columbus, 4211 Maize Road, Columbus, OH
BeComing Circle Initiates
http://photos2.meetupstatic.com/photos/event/2/a/9/6/600_348310902.jpeg
Instructor - Crow, HPS
Class fee is $30 at the door or approved exchange
RSVP with Advance pay of $25 (discounted) by PayPal on the web or by contacting Enchanted Elements (614) 437-2642.
Reservations made directly to Enchanted Elements will be added to the class list manually not online.
Private Instruction ~ Closed to the Public ~ Initiated Members Only
Please come prepared for ritual.
Blessings ~ Crow







