[OWASP-Delhi] Fwd: OWASP Foundation | February 2016 Connector

Sandeep Singh sandeep.singh at owasp.org
Thu Feb 25 18:37:39 UTC 2016


FYI

---------- Forwarded message ----------
From: The OWASP Foundation <The_OWASP_Foundation at mail.vresp.com>
Date: Thu, Feb 25, 2016 at 11:48 PM
Subject: OWASP Foundation | February 2016 Connector
To: sandeep.singh at owasp.org


<http://cts.vresp.com/fbl?243e672b0e/174264e7b2/http%3A%2F%2Fhosted-p0.vresp.com%2F1479611%2F243e672b0e%2FARCHIVE%23like>
<http://cts.vresp.com/ts?243e672b0e/174264e7b2/http%3A%2F%2Fapi.addthis.com%2Foexchange%2F0.8%2Fforward%2Ftwitter%2Foffer%3Ftemplate%3D%257B%257Btitle%257D%257D%2B%257B%257Burl%257D%257D%26url%3Dhttp%253A%252F%252Fhosted-p0.vresp.com%252F1479611%252F243e672b0e%252FARCHIVE%26shortener%3Dbitly%26title%3DOWASP%2BFoundation%2B%257C%2BFebruary%2B2016%2BConnector>
<http://cts.vresp.com/ls?243e672b0e/174264e7b2/http%3A%2F%2Fapi.addthis.com%2Foexchange%2F0.8%2Fforward%2Flinkedin%2Foffer%3Ftemplate%3D%257B%257Btitle%257D%257D%2B%257B%257Burl%257D%257D%26url%3Dhttp%253A%252F%252Fhosted-p0.vresp.com%252F1479611%252F243e672b0e%252FARCHIVE%26shortener%3Dbitly%26title%3DOWASP%2BFoundation%2B%257C%2BFebruary%2B2016%2BConnector>
[image: OWASP Global Connector]

February 25, 2016 | www.owasp.org
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/890cdc62cb/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=www%2Eowasp%2Eorg&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
| Contact Us
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/a9a2cb21b7>
| Brought to you by the OWASP Foundation
[image: Communications] <#-919454803_CommunicationsHeading> ZAP Tops
Toolswatch 2015 Survey! <#-919454803_TOOLSWATCH> OWASP Outreach - Surf to
Snow in January <#-919454803_SURF> OWASP in the News <#-919454803_NEWS> OWASP
Podcasts <#-919454803_PODCASTS> [image: projects] <#-919454803_Projects> New
Project Releases <#-919454803_RELEASES> ZAP User Survey
<#-919454803_ZAPSURVEY> [image: Conference]
<#-919454803_ConferenceHeading> Global
AppSec Events <#-919454803_GLOBAL> Local and Regional Events
<#-919454803_LOCAL> Partner and Promotional Events
<#-919454803_PartnerEvents>
[image: chapters] <#-919454803_ChapterHeading> New OWASP Chapters
<#-919454803_NewChapters> Chapter Restarts
<#-919454803_ChapterRestarts> Chapter
Transitions <#-919454803_Transitions> New Student Chapters
<#-919454803_NewStudentChapters> Chapter Activities
<#-919454803_ChapterActivity> [image: membership]
<#-919454803_MembershipHeading> New Contributing Corporate Members
<#-919454803_CorpRenew> Renewing Premier Corporate Members
<#-919454803_CorpRenew> Renewing Contributing Corporate Members
<#-919454803_CorpRenew> [image: Social Media] <#-919454803_SocialHeading> OWASP
Foundation Social Media <#-919454803_Social>
------------------------------
[image: Communications]
*OWASP Communications*
ZAP Tops Toolswatch 2015 Survey!

The Toolswatch 2015 Survey
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6ced91520d>results
are in:

ZAP
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/c09a785969/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=ZAP&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
is #1
OWTF
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/d94a607d3e/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=OWTF&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
is #10

The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration
testing tool for finding vulnerabilities in web applications. It is
designed to be used by people with a wide range of security experience and
as such is ideal for developers and functional testers who are new to
penetration testing. ZAP provides automated scanners as well as a set of
tools that allow you to find security vulnerabilities manually.

OWASP OWTF is a project focused on penetration testing efficiency and
alignment of security tests to security standards like: The OWASP Testing
Guide (v3 and v4), the OWASP Top 10, PTES and NIST.

Download these tools at:

ZAP: https://www.owasp.org/index.php/ZAP
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6da79051b9/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FZAP&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
OWTF: https://www.owasp.org/index.php/OWASP_OWTF
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f5135ba61d/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FOWASP_OWTF&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

Thank you to everyone who voted for OWASP tools! And congratulations to our
ZAP and OWFT project teams.
Surf to Snow in January!

#2 of our 2016 Strategic Goals
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/ec52f470ae/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=%232%20of%20our%202016%20Strategic%20Goals&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
is to become more involved in the Developer community. We are pleased to
report tremendous turnout for our recent outreach events, Codemash in
chilly Ohio and AppSec California in sunny Santa Monica.

CodeMash
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/70123d48f3>
is a unique event that seeks to educate developers on current practices,
methodologies, and technology trends in a variety of platforms and
development languages such as Java, .NET, Ruby, Python and PHP.

A breakdown of this tremendous event:

   - 2500 attendees
   - 1000 kids
   - 202 speakers
   - 84 staff
   - 280 sessions


Sessions included 40 hours of security content, with 2 days of training by
Jim Manico and Bill Sempf.

OWASP Foundation participated as a Gold level sponsor. Bill Sempf, the
project leader of the OWASP .NET Project and chapter leader for OWASP
Columbus, served on the Session Committee helping to review over 1000
submissions. We have been proud to partner with Codemash over the past two
years and are seeking similar opportunities worldwide.

AppSec California
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/75715dbf94>
is a one of a kind experience for information security professionals,
developers, and QA and testing professionals, as they gather at the beach
from around the world to learn and share knowledge and experiences about
secure systems and secure development methodologies. The third annual event
taking place last month fulfilled all expectations bridging the local
application security and developer communities for a beautiful weekend on
the California coast.

*Tell Us About Your Favorite Developer Events!*

We are looking for developer events to attend. Please Rate the top
Developer Conferences
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/506e3bee21>
where you would like to see OWASP participate. The survey will be open
until EOD Feb, 29, 2016.

Be sure to register for our upcoming events, such as Blackhat Asia 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6b978c59ef>
on March 31 - April 1, 2016 at Marina Bay Sands, Singapore and invite your
colleagues.
OWASP in the NEWS!

Match.com Learns that Encryption Alone Isn't Enough
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/12fddf95b6>
- ComputerWorld 2/19/2016

Severe Glibc Flaw Puts Every Linux Machine in Danger
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/cbc513c32c/story_id=103003BETUVI>
- CIO Today 2/17/2016

OWASP In Depth: An Interveiw with Jim Manico
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/b8843eb777>
- SysCon Media 2/9/2016
OWASP Podcasts

OWASP Projects and activities are often the subject of webcasts and
podcasts. Sit back and relax as you watch and listen to these recent
episodes.

OWASP Top 10 Proactive Controls Project with Jim Manico and Katy Anton
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/01544de371>

The OWASP WebGoat Project, version 7.0, with Bruce Mayhew
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6c6c741c2a>

What's in Store for the OWASP 24/7 Podcast Series in 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/67592d768a>

------------------------------
[image: projects]
*OWASP Projects*

New Project Releases

*WebGoat V.7*

Webgoat v.7 released. Listen to our podcast as Bruce Mayhew explains the
new version. The WebGoat Project started 10 years ago and has had over
1,000,000 downloads. Version 7.0 is being released this week. Matt Miller
caught with Bruce Mayhew, project lead, to talk about the history of the
project, what has been updated in version 7, and what he foresees as the
future of this project. Project Page:
http://www.owasp.org/index.php/CategorY:OWASP_WebGoat_Project
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/8b1dda8b1b/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=http%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FCategorY%3AOWASP_WebGoat_Project&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
.

*OWASP ZSC Project*

OWASP ZSC is an open source software in python language which lets you
generate customized shellcodes and convert scripts to an obfuscated script.
Shellcodes are small codes in assembly which could be use as the payload in
software exploiting. Other usages are in malwares, bypassing anti viruses,
obfuscated codes and etc. Obfuscate codes can be use for bypassing
antiviruses, code protections, same stuff, etc. This software can be run on
Windows/Linux/OSX under python.

Why use OWASP ZSC?
According to other shellcode generators such as metasploit tools and etc,
OWASP ZSC using new encodes and methods which antiviruses won't detect.
OWASP ZSC encoders are able to generate shellcodes with random encodes that
lets you to get thousands of new dynamic shellcodes with the same job in
just a second, it means you will not get a same code if you use random
encodes with same commands, and that makes OWASP ZSC one of the bests!
otherwise it's going to generate shellcodes for other operation systems in
the next versions. It’s the same story for the code obfuscation.

Learn more at" https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/aae55d9b6e/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FOWASP_ZSC_Tool_Project&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
.

*ESAPI*

ESAPI project co-leader, Kevin Wall announced his team has just tagged (and
signed) a new ESAPI release. The tag name is esapi-2.1.0.1. There are 36
GitHub issues that were closed. You can find full details at:
https://github.com/ESAPI/esapi-java-legacy/blob/master/documentation/esapi4java-core-2.1.0.1-release-notes.txt
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/e8839b9741>.
Note that there are also some important changes made to the GitHub repo
itself. Specifically, we have chosen to adopt a git workflow based on this
blog: http://nvie.com/posts/a-successful-git-branching-model/
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/d5ab6be60b>,
where all the new development work will be done on the 'develop' branch and
the 'master' branch will henceforth reflect the latest official ESAPI
release.
ZAP User Survey

Please help us to make @owasp ZAP even better for you by answering the ZAP
User Questionnaire
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/929e50579a>
.
------------------------------
[image: Conference]
*OWASP Events*

<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/60c97257f2>
Global AppSec Events

AppSec Europe 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/1af7108927>,
30 June - 1 July, 2016, Rome, Italy. Call for Lightning Trainings
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6d36355b36/page_id=337>
closes April 30. Call for Activities
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f37f5fb618/page_id=403>
closes April 30.

AppSec USA 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/5e082ef586>,
11 October - 14 October 2016, Washington, DC
Regional and Local Events

Latam Tour 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/81c808f31a/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=Latam%20Tour%202016&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>,
April 7, 2016 - April 22, 2016, Latin America

AppSec ASIA 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/cb56822cab/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=AppSec%20ASIA%202016&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>,
May 19, 2016 - May 22, 2016, Wuhan, China
Partner and Promotional Events

ONE2ONE SUMMIT
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/0bdfa0ece3>,
February 27 - February, 29, 2016, Parc 55 San Francisco, CA

CISO Middle East Summit & Roundtable
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/4d67ebcafd>,
February 29 - March 3, 2016, Habtoor Grand Hotel Dubai, The UAE. OWASP
members save 20% by registering with your OWASP email address and discount
code: OWASP2016

Blackhat Asia 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/bce8c86334>:
March 31 - April 1, 2016, Marina Bay Sands Singapore, OWASP members receive
a $200/USD discount on Briefings with discount code: OWBR0316

Connected Security Expo
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/e4a5814e87>,
April 6 - April 8, 2016, Sands Expo Las Vegas, NV

QuBit Conference
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/9067c793b0>,
April 12 - April 14, 2016, Grandior Hotel Prague. OWASP members can save
10% by using their OWASP email address and discount code: OWASP*2016

13th Annual CISO Europe Summit & Roundtable 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/5fccfbab3c>,
May 10 - May 13, 2016, Copenhagen Marriott, Denmark. OWASP members save 20%
by registering with your OWASP email address and discount code: OWASP2016

ONE2ONE SUMMIT
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f34a300532>,
May 23 - May 25, 2016, Hotel Monteleone, New Orleans, LA

Hack in the Box
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/075c74ed7e>:
May 26-27, 2016, Amsterdam, The Netherlands

SC Congress Toronto
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/abf3752fb5>:
June 1, 2016 - June 2, 2016, Metro Convention Center Toronto, CN. Register
today for an exclusive OWASP Member discount of $125. Full Conference pass
sells for $350 Use the discount code - OWASPMEM

Techno Security & Forensics Investigations Conference / Mobile Forensics
World
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/768cb9fb6a>:
June 5 - June 8, 2016, Myrtle Beach, SC, OWASP Members save 30% by using
your @owasp email address and discount code: OWASP16

ICCS 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/3c729906ca>:
July 25 - July 28, 2016, Fordham University at Lincoln Center, New York, NY

Black Hat USA 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f8879a9621>:
July 30 - August 4, 2016, Las Vegas, NV

BSides Las Vegas
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/4a3f24140f>:
August 2 - August 3, 2016, Las Vegas, NV

ONE2ONE SUMMIT
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/1d33c45609>:
September 14 - September 16, 2016, Boca Beach Club, Boca Raton, FL

(ISC)2 Security Congress EMEA 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/17c7a026e6>:
October 18-19, 2016, Croke Park Stadium Dublin, Ireland
------------------------------
Ads are not endorsements and reflect the messages of the advertiser
only.They represent co-marketing arrangements
with other organizations in support of the OWASP Community.   CLICK HERE
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/5b1076e76a/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=CLICK%20HERE&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
for more information on advertising.
[image: ICCS 2016, July 25-28, 2016, Fordham University, New York, NY, USA]
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/5f77e64209>
[image:
Black Hat Asia 2016, March 29-April 1, 2015, Marina Bay Sands, Singapore]
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f15d17a522>
[image: CISO Middle East, 1-3 March 2016, Habtoor Grand Hotel, Dubai, UAE]
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/6ded31af45>
------------------------------
[image: chapters]
*OWASP Chapters*
New Chapters

   - Fukushima, Japan: Masato Kaneko (masato.kaneko at owasp.org), leader
   https://www.owasp.org/index.php/Fukushima
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/d37f183bf8/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FFukushima&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

Chapter Restarts

   - Bototá, Colombia: Giovanni Cruz Forero (giovanni.cruz at owasp.org) leader
   https://www.owasp.org/index.php/Bogota
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/dc75cd7826/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FBogota&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

   - Iran: Ali Razmjoo (ali.razmjoo at owasp.org) and Reza Espargham (
   reza.espargham at owasp.org), leaders
   https://www.owasp.org/index.php/Iran
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/c79b5a1891/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FIran&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
   Note: due to the US Embargo in Iran, this chapter is ineligible for
   funding from the Global Foundation.

Transitions

   - Dallas: New Chapter leader Denis Sheridan (Denis.sheridan at owasp.org)
   joins board members Matthew Parsons (matt.parsons at owasp.org and Steve
   Horstman (steve.horstman at owasp.org)
   https://www.owasp.org/index.php/Dallas
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/551a78f516/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FDallas&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

   - Gothenburg: Mikael Falkvidd (mikael.falkvidd at owasp.org) and Viktor
   Hedberg (victor.hedberg at owasp.org) will join Jonas Magazinius as chapter
   leaders. Many thanks to Mattias Jidhage and Ulf Larson who are stepping
   down. https://www.owasp.org/index.php/Gothenburg
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/9903e41b6b/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FGothenburg&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

   - Lucknow, India: Deep Yadav (deep.yadav at owasp.org) joins Nitin Pandey
   as chapter leader
   https://www.owasp.org/index.php/Lucknow
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/d276036e48/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FLucknow&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>

   - Sendai, Japan: Jun Sato (jun.sato at owasp.org) joins Takaharu Ogasa as
   chapter leader
   https://www.owasp.org/index.php/Sendai
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/caf5af2a13/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=https%3A%2F%2Fwww%2Eowasp%2Eorg%2Findex%2Ephp%2FSendai&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>


New Student Chapter Learn more about our Student Chapters
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/8b5499ff51/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=Student%20Chapters&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
and Academic Supporter programs.
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/ac4fad7792/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=Academic%20Supporter%20programs%2E&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
Notable
Chapter Activity

OWASP New Zealand and the University of Aukland presented its seventh
annual OWASP New Zealand Day
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f33210ae43/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=OWASP%20New%20Zealand%20Day&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
on February 4. The OWASP New Zealand Day conference is a free, one-day
event dedicated to application security, with an emphasis on secure
architecture and development techniques to help Kiwi developers build more
secure applications. The conference was preceded by a training event on
February 3. Slide decks are posted to the 2016 OWASP New Zealand Day website
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/625712263d/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=the%202016%20OWASP%20New%20Zealand%20Day%20website&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>.


Who attended?

   - Web Developers: The morning sessions introduced attendees to
   application security. Afternoon sessions took a deeper dive into technical
   topics, building on the morning sessions.
   - Management: After an introduction to web application security, one of
   the afternoon streams focused on informational and defensive topics.
   - Security Professionals and Enthusiasts: Technical sessions later in
   the day showcased new and interesting attack and defense topics.


*A Cozy Evening at Snow FROC 2016*

Snow FROC 2016
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/7c9707d166>,
took place this past week on February 18 in Denver, Colorado. The OWASP
Colorado chapters hosted 200 developers, business owners, and security
professionals for a day of presentations, training, and bonding. Jeremiah
Grossman, Founder of WhiteHat Security, gave the keynote address, followed
by a 2-track session and a parallel hands-on course.

*Lunch and Learn with OWASP NYC/NJ*

The OWASP NYC chapter has begun a series of virtual lunch and learn
sessions about projects. The first call on February 23 featured the OWASP
Benchmark project with Dave Wichers. Next month they will feature ASVS with
Jim Manico. Full details for the 2016 program is available online at:
http://www.meetup.com/metrocsc/
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/da05c9edac>.
Raising appsec visibility one meeting at a time locally and globally, join
us!

*Share Your Stories!*

We at the OWASP Global Foundation are looking forward to hearing about more
such events in future. Share your chapter's successes! Submit your stories
to support at owasp.org

OWASP Membership is a great way to contribute to our local chapters and
projects. A portion of your membership can be allocated to teh chapter
and/or project of your choice. Please show your support for OWASP Projects
and Chapters by becoming an Individual or Corporate member today!

------------------------------
[image: Membership]
*OWASP Membership*
New Contributing Corporate Members

   - Onward Security Corporation

Renewed Corporate Members (Premier Level)

   - Adobe
   - Contrast Security

Renewed Corporate Members (Contributor Level)

   - Aspect Security
   - CA Technology
   - NetSPI
   - Oneconsult AG
   - WhiteHat Security

Your name here? Find out how by visiting our Corporate Supporters
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/3f03793437/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=Corporate%20Supporters&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
information page.

Thanks to all of our Premier and Contributing Corporate Members
<http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f5fe0ea1fe/utm_content=&utm_source=VerticalResponse&utm_medium=Email&utm_term=Premier%20and%20Contributing%20Corporate%20Members&utm_campaign=OWASP%20Foundation%20%7C%20February%202016%20Connector>
for your support in 2015!
------------------------------
[image: Social Media]
*OWASP Social Media*
OWASP Social Media Site

   - OWASP YouTube Channel
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/93dd9bc519>
   - LinkedIn
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/c2be3de27b>
   - Twitter
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/fdc218b29e>
   - Google +
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/7129f22d65>
   - Facebook
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/cb9936e088>
   - Ning
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/22e93951af>
   - StackOverflow
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/db94d46929/tab=newest&q=owasp>
   - GitHub
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/f77f9ef9e5>
   - Trello
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/c0054efea3>
   - Slack
   <http://cts.vresp.com/c/?TheOWASPFoundation/243e672b0e/174264e7b2/5807718efd>



------------------------------
Click to view this email in a browser
<http://hosted.verticalresponse.com/1479611/243e672b0e/543936139/174264e7b2/>

If you no longer wish to receive these emails, please reply to this message
with "Unsubscribe" in the subject line or simply click on the following
link: Unsubscribe <http://cts.vresp.com/u?243e672b0e/174264e7b2/mlpftw>
------------------------------
The OWASP Foundation
1200-C Agora Drive
#232
Bel Air, Maryland 21014
US
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-delhi/attachments/20160226/f115c845/attachment-0001.html>


More information about the OWASP-Delhi mailing list